Ace the Piedmont Training Challenge 2026 – Get Set to Elevate Your Skills!

Session length

1 / 400

What are Piedmont's guidelines for using company IT resources?

Use for business purposes, protect accounts, do not share passwords, avoid prohibited content; report suspicious activity.

Using company IT resources responsibly and securely is the main idea here. When you use resources for business purposes, you support productivity and protect confidential information. Protecting accounts means choosing strong, unique passwords, using two-factor authentication where available, and staying vigilant for phishing attempts. Not sharing passwords is essential because once a password is shared, control is lost and breaches become much easier. Avoiding prohibited content keeps you in line with laws, company policies, and appropriate-use standards, reducing legal and reputational risk. Reporting suspicious activity helps detect and address threats early, safeguarding the network and data. The other patterns—personal use at any time, sharing passwords, or using resources for non-work activities and storing data publicly—create security gaps and policy violations that these guidelines aim to prevent.

Personal use allowed anytime.

Share passwords among team.

Use for non-work activities and store data publicly.

Next Question
Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy