Skip to content
33212

 

AI POWERED SOLUTIONS BUILT FOR DYNAMICS 365 & POWER PLATFORM

Aligning project work with business goals to empower executives for planning.

Optimise your organisation's workforce to enhance productivity and performance.

Enhance visibility and control performance of procurements, contracts and tenders.

Enabling executives and leaders to plan project work aligned to strategic priorities.


Simplify the way you manage and monitor employee working time and costs.

Enable leaders and teams to manage change with agility and precision.

Empower your entire organisations to effectively manage and mitigate risks. 


Revolutionise the way you manage and conduct inspections of valuable assets.

Powerful, collaborative, scalable, and assisted by Copilot AI, the new Microsoft Planner is coming.

Our Experienced Team of Software Developers Can Always Craft the Ultimate Solution For You.
Keep up with the rapid pace of technological change and meet evolving customer expectations.
Increase productivity and improve the time to market with software applications ready to scale.
Applying a fast iterative approach to implement software based on adopting and integrating practices.
Increase productivity and drive more value with an outsourced IT support model.
123123
Our Experienced Team of Software Developers Can Always Craft the Ultimate Solution For You.
Explore deep analyses and expert perspectives on industry trends and innovations.

Get the latest updates from Microsoft that shape the future of technology and business.

Dive into a rich resource of insights and expert advice from Microsoft and industry leaders.

Discover and register for our forthcoming webinars, workshops, and conferences.

44241

 

EMPOWER

THE DIGITAL FUTURE

WITH EXPERTISE

RGB_Logo-Horizontal white-4

 

Our Experienced Team of Software Developers Can Always Craft the Ultimate Solution For You.
Leverage ready made data-models and insights empowering your business to scale.

Our Dynamics 365 expert team collaborates to design and implement scalable solutions.

Powerful, collaborative, scalable, and assisted by next generation AI, the new Microsoft Planner is coming.

Certified and experienced developers help you craft the ultimate Power Platform solution.

Register for upcoming events to explore innovative solutions with industry experts.

d12d

 

MICROSOFT

AI POWERED

TECHNOLOGIES

l2-png

 

Our Experienced Team of Software Developers Can Always Craft the Ultimate Solution For You.
We build long lasting trusted relationships and help digital transformation success.
We work across all industries with a strong focus on rapid digital transformation
Find answers to common questions about our services, processes, and best practices.

Our policies provide a reference point for our people and stakeholders on the standards.

d2d1

 

WE ARE

THE DIGITAL PROJECT

RGB_Logo-Horizontal white-4

 

Our Experienced Team of Software Developers Can Always Craft the Ultimate Solution For You.

Information Security Policy

1. Intent and Scope

This information security policy provides the basis of cybersecurity management within The Digital Project Corporation Pty Ltd.

This policy applies to all of The Digital Project Corporation Pty Ltd employees, contractors, volunteers, vendors and anyone else who may have any type of access to The Digital Project Corporation Pty Ltd systems, software and hardware.

Effective protection of business information creates a competitive advantage, both in the ability to preserve the reputation of The Digital Project Corporation Pty Ltd and in reducing the risk of the occurrence of negative events and incidents.

 

2. Password Requirements

To avoid employees' work account passwords being compromised, these best practices are advised for setting up passwords:

(a) Use at least 8 characters (must contain capital and lower-case letters, numbers and symbols)

(b) Do not write down password and leave it unprotected

(c) Do not exchange credentials when not requested or approved by supervisor

(d) Change passwords every months

 

3. Email Security

Emails can contain malicious content and malware. In order to reduce harm, employees should employ the following strategies:

(a) Do not open attachments or click any links where content is not well explained

(b) Check the email addresses and names of senders.

(c) Search for inconsistencies

(d) Block junk, spam and scam emails

(e) Avoid emails that contain common scam subject lines such as prizes, products and money transfers

If an employee is not sure that an email, or any type of data is safe, the employee should contact .

 

4. Device Security and Using Personal Devices

Logging in to any work accounts for personal devices such as mobile phones, tablets or laptops, can put The Digital Project Corporation Pty Ltd data at risk. The Digital Project Corporation Pty Ltd does not recommend accessing any The Digital Project Corporation Pty Ltd data from personal devices. However, if this cannot be avoided, employees are obligated to keep their devices in a safe place and not exposed to anyone else.

Employees are recommended to follow these best practice steps:

(a) Keep all electronic devices' passwords secure and protected

(b) Logging into accounts should only be performed through safe networks

(c) Install security updates on a regular basis

(d) Upgrade antivirus software on a regular basis

(e) Never leave devices unprotected and exposed

(f) Lock computers when leaving the desk

 

5. Transferring Data

Data transfer is a common cause of cybercrime. Employees should follow these best practices when transferring data:

(a) Avoid transferring personal information such as customer data and employee information

(b) Adhere to the relevant personal information legislation

(c) Data should only be shared over authorised networks

(d) If applicable, destroy any sensitive data when it is no longer needed

 

6. Physical Documents

Employees are required to ensure that:

(a) All sensitive and confidential information in hardcopy form is secure in their work area at the end of the day

(b) Printed documents containing sensitive and confidential information should be immediately removed from the printer

(c) Any sensitive and confidential information must be removed from the desk and locked in a drawer when the desk is unoccupied and at the end of the work day

(d) File cabinets containing sensitive and confidential information must be kept closed and locked when not in use or when not attended

(e) Keys used for access to sensitive and confidential information must not be left at an unattended desk

(f) Upon disposal of sensitive and confidential documents, documents should be shredded in the official shredder bins or placed in the lock confidential disposal bins

(g) Whiteboards containing sensitive and confidential information should be erased

 

7. Working Remotely

When working remotely, all cybersecurity policies and procedures must be followed.

 

8. Acceptable Use

User accounts on work systems are only to be used for the business purposes of The Digital Project Corporation Pty Ltd and not to be used for personal activities.

Employees are responsible for protecting all confidential information used and/or stored on their accounts. This includes their user logins and passwords. Employees are prohibited from making unauthorised copies of such confidential information and/or distributing it to unauthorised persons outside of The Digital Project Corporation Pty Ltd.

Employees must not purposely engage in any activity with the intent to: harass other users; degrade the performance of the system; divert system resources to their own use; or gain access to The Digital Project Corporation Pty Ltd systems for which they do not have authorisation.

 

9. Security Requirements

Employees must not install unauthorised software.

Employees must not use unauthorised devices on their workstations, unless they have received specific authorisation from .

Employees must not attempt to turn off or circumvent any security measures.

Employees must report any security breaches, suspicious activities or issues that may cause a cyber security breach to .

 

10. Disciplinary Action

If this policy is breached, one or more of the following disciplinary actions will take place:

(a) Incidents will be assessed on a case-by-case basis

(b) In case of breaches that are intentional or repeated or cases that cause direct harm to The Digital Project Corporation Pty Ltd, employees may face serious disciplinary action

(c) Subject to the gravity of the breach, formal warnings may be issued to the offending employee