Template Use Instructions:
The checklists below provide a base checklist for every IBM Consulting workforce member working away from
the IBM office or customer location. This would replace workspace inspection requirements for a office location.
The checklist should be retained until another compliance checklist is completed. Checklist should be completed
when a resource first on-boards and then a yearly project cycle after that.
This checklist is a self-attestation by the project personnel that they are following all applicable rules.
Template Change Control Summary of Changes
Version # Version Date Author Nature of Change
1.0 May 2021 Marjorie M Pal Initial template provide by NA team and added links to
and DS&P BISO guidance.
Global Team
1.1 Jan 2022 F. Lopez Several updates and clarifications made to the checklist.
1.2 Oct 2022 F. Lopez Updates to links under items 4 and 8.
1.3 Jul 2023 F. Lopez Updates to link under item 7.
Home Worker Security Compliance Checklist
By completing this form, you are certifying that you follow the IBM Security best practices in your home office.
Name: Date completed:
Signature via email.
Item Security Best Practice In place
(Yes/No)
1. Always keep your laptop and printed confidential information in a secure and safe space Yes
when you are away from your work area.
2. Activate password protected keyboard/screen lock when you are away from your work area. Yes
3. Secure all passwords and keys, use IBM approved Password Wallets to manage them. Yes
Never leave written log-on passwords or conference line pass codes in your work area, post
on walls, or in trash bin. See list of approved products:
https://w3.ibm.com/#/support/article/38033
4. Client and IBM Confidential information must be properly labelled. See IBM Corporate Yes
Instruction LEG 116: https://w3.ibm.com/ibm/corporate-documents/leg/leg-116 and
https://w3.ibm.com/#/support/article/data_classification
5. Immediately retrieve all confidential faxes and printouts from shared printers. Yes
6. Dispose of all confidential information appropriately (e.g., shredder) so that documents are Yes
unreadable. If you do not have a paper shredder or mechanism to appropriately dispose of
confidential information, then please refrain from printing confidential information.
7. Ensure your internet connection is secured and encrypted before transmitting confidential Yes
information, use Cisco AnyConnect VPN:
https://w3.ibm.com/#/support/article/connect/sas_vpn?_lang=en
8. Do not send unencrypted confidential information over the internet (including FAXs). In the Yes
event you must email confidential information, ensure that you encrypt email in Outlook.
Guidance for non-IBM addresses: https://w3.ibm.com/#/support/article/smime/send_outlook
9. Portable storage media must only be used if you have obtained exception approval to use Yes
USB device through IBM Consulting BISO and is secured. All media must be considered to
contain Confidential information or to be an asset that must be secured. See IBM process
and exception guidance: https://w3.ibm.com/w3publisher/policy-risk-management/prohibited-
use-portable-storage-devices
10. When transporting a laptop from one location to another, store laptops in locked vehicles out Yes
of general view.
11. Log-off and power down laptops, at end of IBM work activities. Yes
12. Validate that you have read and are complying with Corporate guidance for working from Yes
home: https://w3.ibm.com/w3publisher/ibm-work-from-home-guide
13. Watch the 2 minutes IBM Consulting BISO video on working at home Yes
https://bundles.yourlearning.ibm.com/ibm/gbs-biso/#RKEQRPXVYEQY15RE/
QPDRKNDYGMEV152J