IT Systems & Security Employee Questionnaire
Section 1: General Information
Full Name:
Department / Team:
Work Location:
Select...
Office
Remote
Hybrid
Section 2: Device Ownership & Use
1. Primary device for work:
Select...
Desktop
Laptop
Other
2. Is this your assigned company device?
Yes
No
3. If No, who owns the device?
4. Do you take this device home?
Yes
No
5. If yes, how often and for what type of work?
6. Does this device connect to your home network?
Yes
No
6.5. Does this device connect to public Wi-Fi?
Yes
No
7. Do you use personal devices for work-related tasks?
Yes
No
8. If yes, specify what type of work is done on personal devices.
9. Is the device protected with a password, PIN, or biometric authentication?
10. Do you use auto-lock and encryption on your devices?
Yes
No
Unsure
Section 3: Network & Connectivity
1. Do you connect to the company network or VPN when working remotely?
2. How do you usually access company files or applications?
3. Do you ever connect to public Wi-Fi for work?
Yes
No
4. If yes, do you use a VPN or secure connection while doing so?
5. Do you share your internet connection with any personal smart devices?
6. Do you know the SSID name of your home Wi-Fi network?
7. Is your home Wi-Fi password-protected and using WPA2/WPA3 encryption?
8. Do you ever share your work device’s internet (hotspot) with others?
Yes
No
Section 4: File Access, Transfers, & Storage
1. What types of files do you work with most?
2. Where are these files stored?
Select...
Local drive
Shared drive
Cloud
External drive
3. Do you upload or download files as part of your work?
Yes
No
4. If yes, what kind of files and where do they come from / go to?
5. Do you ever use file-sharing platforms?
Yes
No
6. Are these services approved by IT?
Yes
No
Unsure
7. Do you send or receive files via personal email accounts?
Yes
No
8. Do you use USB drives or external hard drives for work purposes?
Yes
No
9. If yes, are these devices encrypted or company-issued?
10. How do you handle backups of your work files?
Select...
Automatic
Manual
Not sure
Section 5: Applications & Software
1. What core applications do you use daily?
2. Do you have administrative rights to install software on your device?
Yes
No
3. Have you installed any software on your own (without IT approval)?
Yes
No
4. Are your software tools and operating systems updated regularly?
5. Do you use any music or copyright databases?
6. Do you log in to these systems using multi-factor authentication (MFA)?
7. Are you aware of the company’s approved software list?
Yes
No
Section 6: Data Protection & Privacy
1. Are you familiar with the company’s data handling and copyright protection policies?
Yes
No
Unsure
2. Do you handle any sensitive or confidential files?
3. How do you share sensitive files internally or externally?
4. Do you ever print or physically store sensitive documents?
5. Do you use encryption or password protection when sharing files?
6. Have you received data protection or cybersecurity training in the last 12 months?
7. Are you aware of what to do if a data breach or malware infection occurs?
8. Do you lock your computer screen when away from your desk?
Yes
No
Section 7: Access Control & Accounts
1. Do you use a unique username and password for your company accounts?
2. Do you ever share login credentials with others?
Yes
No
3. Do you change your password regularly?
4. Do you use a password manager?
Yes
No
5. Do you have access to shared accounts or folders?
6. Are you aware of who else has access to those shared resources?
7. Have you ever had access issues?
Section 8: Final
1. Have you experienced any technical or access issues?
2. Do you have any concerns about IT systems, data safety?
3. Additional comments or feedback:
After you click sumbit it will download a .MD file, save this file and send to the email contact@ringomar.com
Submit