- Most valuable resinous wood in the World
- Anticipated returns in excess of 15% AAR
Information correct as at 1 September 2008.
1. Recommended IT Security Practices
1.1 Touchwood Limited (Touchwood) encourages you to follow safe computing practices and consider the following tips:
1.1.1 Password protect your computer to stop other parties accessing your email. It is also advisable to safeguard any computer-related password(s);
1.1.2 Never click on an email that requests you to login or asks for private details. Touchwood will never send you an email containing such requests;
1.1.3 Use email spam filters to help protect you from receiving spam/hoax emails. Anti-virus/anti-spam software and Internet Service Providers (ISPs) now offer email spam filtering services. These spam filtering services intercept many hoax emails preventing them from reaching your email inbox. You may need to contact your ISP either by telephone or via their website in order to activate spam filtering on your email account. You should check that your or your ISP's spam filters are not blocking emails from Touchwood.
1.1.4 Steer clear of opening, running, installing or using programs/files you have obtained from a person or organization that you do not know you can trust. Be particularly careful of unsolicited emails containing file attachments;
1.1.5 Always scan new programs/files for viruses and spyware before and after opening, running, installing or using them.
1.1.6 To help keep emails secure, you should always maintain up-to-date versions of firewalls, anti-virus, anti-spam, anti-spyware, anti-phishing and other security software and tools. A number of vendors provide such products.
2.1 Touchwood is committed to keeping secure the personal information you provide to us. We take all reasonable precautions to protect the personal information we hold about you from misuse and loss and from unauthorized access, modification or disclosure.
2.2 We have a range of physical and technology policies in place to provide a strong security environment. We ensure that these measures meet our Client’s needs by regularly reviewing them. Our security measures include, but are not limited to:
2.2.1 Requiring employees to use unique passwords to gain access to systems. These passwords are changed regularly and their use is monitored;
2.2.2 Employing firewalls and virus scanning tools to prevent unauthorized persons and viruses from entering our IT systems;
2.2.3 Providing secure storage for physical records;
2.2.4 Detecting and preventing unauthorized access to buildings by employing physical and electronic means such as alarms, cameras and guards as required; and
2.2.5 Restricting access to our computer systems and physical records only to authorized staff and preventing users from accessing information they have no need to access.