Welcome to Waverley Software Vietnam Portal
Select to download related files from following list:
- Health Insurance Program (Chương Trình Bảo Hiểm)
- Guarantee for hospital fees (Danh sách bệnh viện có Bảo lãnh viện phí)
- Claim form (Mẫu yêu cầu thanh toán)
- Accident records (Biên bản tường trình tai nạn)
- Claim Procudure (Quy Trình Bồi Thường)
- Blacklist Of Clinics/Medical Facilities/Pharmacies (Danh sách từ chối bảo lãnh)
- App Installation Guide (Cài đặt app điện tử)
- Claim online Guide (Hướng dẫn khai báo bồi thường)
Guide & Security
- Guide VPN: VPN to the company network when working remotely
- Security: Security Practices
Material
- Projects: https://drive.google.com/drive/u/1/folders/1DkKcQVsKixkkQLvVhTBAS0rs8j_QRFuC
- Forms: https://drive.google.com/drive/u/1/folders/1EbMtJWq6ycESv5HOohSWBGuJ__b6L_jV
You can get the links/info about the material need for your roles here.
Version 0.1 - Oct 8, 2019
1. Use passwords that can't be easily guessed, and protect your passwords.
2. Minimize storage of sensitive information.
3. Never reveal your password or click on unknown links or attachments. Be careful who you share your private information with.
4. Protect information when using the Internet and email.
5. Make sure your computer is protected
6. Secure laptop computers and mobile devices at all times
7. Shut down, lock, log off, or put your computer and other devices to sleep before leaving them unattended
8. DO NOT install or download unknown or unsolicited programs/apps to your computer, phone, or other devices.
9. Secure your area before leaving it unattended.
10. Make backup copies of files or data you are not willing to lose -- and store the copies very securely.
11. Every plugin or add-on you install in your browser can expose you to more danger.
1. Use passwords that can't be easily guessed, and protect your passwords.
• DO NOT share your passwords and avoid writing them down.
• Characteristics of good, cryptic passwords:
• Contain a mixture of upper and lower case letters, numbers, and symbols
• At least 8 characters in length (or longer if they're less complex)
• Difficult to guess (e.g. DO NOT include real words or personal information like user name, names of family members, places, pets, birthdays, addresses, hobbies, etc.)
• Easy to remember (so you DO NOT have to write them down)
• Password protect all of your devices.
2. Minimize storage of sensitive information.
• Delete sensitive information whenever you can. Keep it off of your workstation, laptop computer, and other electronic devices if at all possible.
• DO NOT keep sensitive information or your only copy of critical data, projects, files, etc. on portable or mobile devices (such as laptop computers, tablets, phones, memory sticks, CDs/DVDs, etc.) unless they are properly protected. These items are extra vulnerable to theft or loss.
• Forgetting to shred documents before they go into the trash or recycling bin: Any document may contain sensitive information; it’s best to shred everything rather than taking a risk.
• Placing documents on the desk that could contain sensitive information: It’s best to keep them locked up in drawers and file cabinets.
• Displaying calendars in the open or on the screen for all to see: Calendars often contain sensitive dates and/or information about customers, prospects and/or new products.
• Neglecting to erase notes on whiteboards: They often display confidential information on products, new ideas and proprietary business processes.
3. Never reveal your password or click on unknown links or attachments. Be careful who you share your private information with.
• DO NOT respond to email, instant messages (IM), texts, phone calls, etc., asking you for your password. You should never disclose your password to anyone.
• Only click on links from trusted sources. Never click on an unfamiliar link unless you have a way to independently verify that it is safe. This includes tiny URLs and any link where you can't tell where it will take you.
• DO NOT open unsolicited or unexpected attachments. If you can't verify an attachment is legitimate, delete it.
• DO NOT give private information to anyone you DO NOT know or who doesn't have a legitimate need for it -- in person, over the phone, via email, IM, text, Facebook, Twitter, etc.
• Writing user names and passwords on slips of paper or post-its: This is especially important given that usernames and passwords are typically used to log in to more than one site.
4. Protect information when using the Internet and email.
• Only use trusted, secure web pages when entering personal or sensitive information online. DO NOT log in to web sites or online applications unless the login page is secure.
• Look for https (not http) in the URL to indicate that there is a secure connection.
• DO NOT send restricted data via text or instant message (IM). These are not generally secure methods of communication.
• Be extremely careful with file sharing software. File sharing opens your computer to the risk of malicious files and attackers.
5. Make sure your computer is protected
• with antivirus and all necessary security "patches"and updates, and that you know what you need to do, if anything, to keep them current.
• Shut down or restart your computer at least weekly -- and whenever your programs tell you to in order to install updates. This helps to make sure software and security updates are properly installed.
• If you get an antivirus alert that there is malware on your computer, contact the IT for assistance.
6. Secure laptop computers and mobile devices at all times
• Lock them up or carry them with you.
• In your office or dorm room, at coffee shops, meetings, conferences, etc.
• Make sure it is locked to or in something permanent.
7. Shut down, lock, log off, or put your computer and other devices to sleep before leaving them unattended and make sure they require a secure password to start up or wake-up.
• <ctrl><alt><delete> or <Windows><L> on a PC; Apple menu or power button on a Mac.
• Also set your computer and portable devices to automatically lock when they're not being used.
8. DO NOT install or download unknown or unsolicited programs/apps to your computer, phone, or other devices.
• These can harbor behind-the-scenes viruses or open a "back door"giving others access to your devices without your knowledge.
9. Secure your area before leaving it unattended.
• Lock windows and doors, take the keys out of drawers and doors, and never share your access code, card or key.
• Be sure to lock up portable equipment and sensitive material before you leave an area unattended.
10. Make backup copies of files or data you are not willing to lose -- and store the copies very securely.
• Using Google Drive of your waverleysoftware.com account is recommended
11. Every plugin or add-on you install in your browser can expose you to more danger.
• Only install the plugins you need and make sure they are always current. If you no longer need a plugin, disable or remove it from your browser via your browser's plugin preferences.