Security Policy
Information security expectations for users of the LMK system.
Last updated: 1 April 2026
The LMK system is designed to support RMCD security objectives. Users should choose strong passwords, keep them confidential, and change them regularly.
Access to internal modules is role-based and data-scoped. Only approved users may log in; significant actions may be recorded in the audit trail for governance.
Use secure connections (HTTPS) in production environments. Avoid accessing official accounts from untrusted public networks without additional safeguards.
Upload only necessary documents. Do not upload malware or attempt to probe system security without formal authorisation.
Suspected security incidents should be reported promptly to the system administrator or RMCD ICT so that remediation and compliance steps can be taken.
Security is a shared responsibility. Following this policy helps protect the E-LMK service and applicants’ data.