SAMMY UI is optimized for resolutions with a width 1024px and higher.
Clean Desk Policy and Procedures
HRS-03: Are policies and procedures requiring unattended workspaces to conceal confidential data established, documented, approved, communicated, applied, evaluated, and maintained?
The organization should establish and communicate a “clean desk” policy to guide personnel on reducing the risk of unauthorized access to information.

The following guidelines should be considered:
a. Sensitive or critical business information (e.g., on paper or electronic storage media) should be locked away—ideally in a safe, cabinet, or other security furniture—when not required.
b. User endpoint devices should be protected by key locks or other physical security means when not in use.
c. Documents containing sensitive information from multi-function devices (such as printers and other reproduction technologies) should be stored securely. When these documents are no longer required, they should be discarded using secure disposal methods.
d. Whiteboard and other types of displays should be cleared when not required.
e. Computers should be configured to automatically lock the computer screen after an idle period (screen lock timeout).
f. Users should be trained to log out of systems or lock computer screens when not at workstations.

The organization should have procedures to vacate facilities, including conducting a final sweep before leaving to validate the organization's assets are not left behind (e.g., documents fallen behind drawers or furniture)
Control implemented
Control ownership
Description

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures that require unattended workspaces to not have openly visible confidential data. Review and update the policies and procedures at least annually.

Clean Desk Policy and Procedures
HRS-03: Are policies and procedures requiring unattended workspaces to conceal confidential data reviewed and updated at least annually?
The organization should establish and communicate a “clean desk” policy to guide personnel on reducing the risk of unauthorized access to information.

The following guidelines should be considered:
a. Sensitive or critical business information (e.g., on paper or electronic storage media) should be locked away—ideally in a safe, cabinet, or other security furniture—when not required.
b. User endpoint devices should be protected by key locks or other physical security means when not in use.
c. Documents containing sensitive information from multi-function devices (such as printers and other reproduction technologies) should be stored securely. When these documents are no longer required, they should be discarded using secure disposal methods.
d. Whiteboard and other types of displays should be cleared when not required.
e. Computers should be configured to automatically lock the computer screen after an idle period (screen lock timeout).
f. Users should be trained to log out of systems or lock computer screens when not at workstations.

The organization should have procedures to vacate facilities, including conducting a final sweep before leaving to validate the organization's assets are not left behind (e.g., documents fallen behind drawers or furniture)
Control implemented
Control ownership
Description

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures that require unattended workspaces to not have openly visible confidential data. Review and update the policies and procedures at least annually.