![]() ![]() ![]() All employees, contractors and business partners on the Postal Service computer network must report any type of computer abuse - including theft, loss of data, computer security-related incidents, repetitive chain emails, Point of Service (POS) issues, phishing, and social media scams - to the Computer Incident Response Team (CIRT). Documents that contain sensitive postal or personal information - such as Social Security numbers and financial statements - could be read by anyone if the transmission report isn’t collected by the sender.Īs a precaution, CISO recommends taking the extra step of always including a cover sheet before faxing sensitive postal or personal documents. If the sender doesn’t add a cover sheet, the report often automatically includes the first page of the outgoing document. As the name specifies, an attention fax cover sheet is used when you have an important message to convey that demands the recipient’s attention. The documents can be attached using the ‘paper clip’ symbol that you can find on the right side of the ‘Send’ option of Gmail. This can be either doc, PDF or any other form of attachment which is supported by Gmail. The report indicates whether a fax was successfully transmitted. Step 4: After that, you can append the document or fax message in the form of an attachment. The transmission report that’s automatically generated by a fax machine after a document has been sent could unintentionally allow others to see a sender’s information, according to the Postal Service™ Corporate Information Security Office (CISO). With so much attention on Internet and email security, it’s easy to forget other forms of communication have vulnerabilities too. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |