AR 25-2 requires users to secure their computers at the end of the workday by ensuring that all sensitive information is protected. This includes logging off or shutting down the computer, locking screens, and securing any physical documents. Users must also ensure that any removable media is properly stored or disposed of to prevent unauthorized access. Compliance with these procedures helps safeguard information and maintain operational security.
Copyright © 2026 eLLeNow.com All Rights Reserved.