Information is a valuable asset and access to it must be managed with care to ensure that confidentiality, integrity, and availability are maintained.
This procedure outlines the rules relating to authorizing, monitoring, and controlling access to Fleming accounts, information and information systems.