Employee Handbook and Policy Quick Reference
Section titled “Employee Handbook and Policy Quick Reference”2026.1
This is an abridged version of Changineers’s security policy that all workforce members are required to be familiar with and comply with.
You are assumed to have read and fully understood the corporate security and privacy policies, standards, guidelines, controls and procedures even if you haven’t. So, it’s probably best you still go through the whole thing at some point.
- You are required to follow detailed procedures defined in certain policies related to your job role.
Security is everyone’s responsibility. If this is not your first job, don’t do anything that might get you in trouble at your previous workplace. When in doubt, stop and ask.
Training
Section titled “Training”You will be prompted as part of onboarding, and periodically going forward, to complete the following security training:
-
General security policy and procedures training, including
-
Ongoing security awareness training (a monthly series, currently provided by )
-
Role-based security training
-
all members of the Development/Engineering team must carefully review the following policies and procedures
-
all members of the Administrative, Marketing and Procurement teams must review the following policies and procedures
-
all members of the Administrative and Senior Leadership/Executive teams must review the following policies and procedures
-
all members of the HR and Facilities teams must review the following policies and procedures
-
all team members responsible for Product Management and Business Development must review the following policies and procedures
- Privacy and Consent
-
all members of the Security, Compliance and IT teams must review all policies and procedures in its entirety
-
Acceptable use policy for end-user computing
Section titled “Acceptable use policy for end-user computing”The full acceptable use policy is in HR and Personnel Security. Read it in full as part of onboarding.
Your responsibilities for computing devices
Section titled “Your responsibilities for computing devices”Changineers provides company-issued laptops and workstations to all employees. Changineers currently does not require or support employees bringing their own computing devices.
The laptops and/or workstations assigned to you are yours to configure and manage according to company security policy and standards. You are responsible to
-
configure the system to meeting the configuration and management requirements, including password policy, screen protection timeout, host firewall, etc.;
-
ensure the required anti-malware protection and security monitoring agent is installed and running; and
-
install the latest security patches timely or enable auto-update.
IT and Security provides automated scripts for end-user system configurations and/or technical assistance as needed.
You are also responsible for maintaining a backup copy of the business files local on your laptop/workstation to the appropriate location on Changineers file sharing / team site (e.g. SharePoint). Examples of business files include, but are not limited to:
- Documents (e.g. product specs, business plans)
- Presentations
- Reports and spreadsheets
- Design files/images/diagrams
- Meeting notes/recordings
- Important records (e.g. approval notes)
Unless the local workstation/device has access to Critical data, backups of user workstations/devices are self managed by the device owner. Backups may be stored on an external hard drive or using a cloud service such as iCloud if and only if the data is both encrypted and password protected (passwords must meet Changineers requirements).
Getting help
Section titled “Getting help”Support for most of our business applications are self-service, such as password reset via Okta.
If needed, users may use our internal service desk to request IT and Security support. Common requests include:
- Password reset and access requests
- Request new software and hardware
- Technical support
- Recommend changes to policies and processes
How to report an incident or suspicious activity
Section titled “How to report an incident or suspicious activity”You are responsible to report all suspicious activities and security-related incidents immediately to the Information Security team, by one of the following channels:
-
(preferred) Email the Information Security team at security@changineers.com.au
-
For non-sensitive, non-confidential security issues and concerns, employees may post questions on Changineers’s #infosec Slack channel.
-
Additionally, employees may report the incident to their direct manager.
-
To report a concern under the Whistleblower Policy, you may first discuss the concerns with your immediate manager, or report it directly to the CEO or COO. See the HR Security Policy for additional details.
Revision History
Section titled “Revision History”| Date | Summary | Approved by |
|---|---|---|
| 2020-01 | Initial revision. | James Gregory |
| 2026-04-24 | Dropped BYOD language; embedded acceptable use section replaced with link to the canonical policy. | James Gregory |