Provide training on handling personal information.
4. Recommended Safety Procedures
Conduct a risk assessment of the ICT environment at least annually.
Develop and display a written ICT safety policy.
Provide induction training for new users and refresher sessions for existing staff.
Maintain an incident‑reporting system for accidents, near‑misses, and security breaches.
Schedule regular maintenance checks for hardware, software, and physical infrastructure.
Test backup and recovery processes quarterly.
Review and update security measures in response to emerging threats.
5. Summary Checklist
Are workstations ergonomically set up?
Are cables secured and power outlets not overloaded?
Is antivirus software active and up‑to‑date?
Are strong passwords and multi‑factor authentication in use?
Is data regularly backed up and tested?
Are fire safety devices functional and inspected?
Is staff trained on safe ICT practices and data protection?
Suggested diagram: Flowchart showing the relationship between causes of safety issues, preventive strategies, and outcomes (reduced risk, improved productivity).