All system users are responsible for acting in accordance with the rules of use and instructions stipulated in this document, and should report any security breach they encounter during their work to attorney Malke Borow, who is in charge of privacy protection at the IMA, and to Mr. Omer Orbach, the IMA’s cyber and technologies officer.
The rules of use are intended to guide users in the steps they should take to protect the security of the information stored in the system.
1. Accessing the system
1.1 Entry to the system will be as follows:
1.1.1 The user enters a 9-digit ID number. A personal 4-digit code will be sent to the user’s mobile device for one-time use. The user will enter this code on the website to connect to the system.
1.2 The system will disconnect in the event of inactivity. Nonetheless, users should disconnect from the system when finishing their work, or when leaving the computer unattended. Users should disconnect by clicking on “Exit” and should lock the computer with a password-protected screen saver.
1.3 The system will lock the user’s account after five failed attempts to connect.
1.4 The system manager can unlock the user’s account – but only after checking with the user why the account was locked and after verifying the user’s identity.
2. A user must not use the same user account on two different computers at the same time.
3. No classified materials may be downloaded from the system to a personal telephone or personal computer.
4. After finishing their work, users should disconnect from the system by clicking on the “Exit” button.
5. Using the system
5.1 All users must sign a confidentiality document before using the system. The document is available at the IMA/association.