Read Aloud the Text Content

This audio was created by Woord's Text to Speech service by content creators from all around the world.


Text Content or SSML code:

Overview: Responsible Use of Technology Responsible Use of Technology Data resides in three key areas at Penn Mutual and each area requires specific attention to protection and threat mitigation. 1 Computers. Employees are required to only use work-issued computers to conduct Company business. Non-Company computers that access Penn Mutual resources must have a current anti-virus program, personal firewall, and current operating system updates installed. 2 Personal Devices. If your role includes using your smartphone, tablet, or other personal devices to conduct work business, you're required to follow the Company policies and standards to protect Company information. 3 The Cloud. Employees and HTK-registered financial professionals are required to only use Company-approved cloud services to retain and share Company information and data. Continued Encryption of Emails Containing Confidential Information We are all responsible to actively protect confidential information, including emails. All employees and financial professionals are required to use encryption when sending emails that contain confidential information to external recipients. Company Email Accounts: Always use secure email by typing the word "secure" in square brackets in the subject line, i.e. [secure]. Secure email encrypts the data in the email message and its attachments. Everyone is expected to actively protect confidential information in all emails and should never rely on auto-encryption rules. Non-Company Email Accounts: The financial professional is expected to review subscription plans available to validate email encryption is enabled to protect confidential information when sending emails (e.g., Transport Layer Security (TLS), Advanced Encryption Standard (AES), or other email encryption method). Continued Working Safely In today's world, many of us find ourselves getting the majority (or all) of our work done outside of the physical confines of an office location, or even outside of our home offices. Working in public spaces can present security challenges, but there are steps that you can take to keep your laptop, devices, and confidential information safe—whether you're at a local coffee shop or in between flights at the airport. • Use a Virtual Private Network (VPN). Use a VPN to encrypt your internet connection, making it harder for potential cybercriminals to intercept your data. Remember to always use a secure Wi-Fi network that requires a password—even with a VPN. • Avoid Shoulder Surfers. Be mindful of your surroundings and assure no one is looking over your shoulder while you're working. • Lock Your Devices. Always lock your devices with a strong password, PIN, or biometric authentication. • Avoid Public Charging Stations. Public charging stations can be compromised to steal data or install malware. Use your own charger or a portable power bank instead. • Practice Paper Management. Safeguard papers and files containing confidential information at all times. Shred all paper you no longer need. Continued Neglecting physical security measures poses a risk to information security. Leaving devices unattended in public places or not properly securing physical documents and storage media can lead to unauthorized access or theft of confidential information. Keep your laptop, devices, and confidential information safe at all times whether you are working in the office, remotely, or when traveling. Always notify the Solution Center immediately if your computer or managed mobile device is lost or stolen, then (if stolen) file a police report.