Sample New Hire Security Awareness Standard:: Difference between revisions
No edit summary |
|||
(5 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
== | ==Sample End User Computing and Technology Policy== | ||
The End User Computing and Technology Policy define the Company objectives for establishing specific standards on appropriate business use of the Company's information and telecommunications systems and equipment. | |||
=Objectives== | |||
<br> | <br> | ||
Company information and telecommunications systems and equipment, including Internet, electronic mail, telephone, pager, voice mail and fax, are provided for official and authorized Company business purposes. Any use of such systems and equipment perceived to be illegal, harassing, offensive, or in violation of other Company policies, standards or guidelines, or any other uses that would reflect adversely on Company, can be considered a violation of this policy.<br> | |||
<br> | <br> | ||
The Company reserves the right to monitor, record, or periodically audit use of any of its information and telecommunications systems and equipment. Use of these systems and equipment constitutes expressed consent by those covered by the scope of this policy to such monitoring, recording, and auditing. Actual or suspected misuse of these systems should be reported to the appropriate Company management representative in a timely manner. Specific instructions and requirements for reporting misuse of Company information and telecommunications systems and equipment are provided in the Misuse Reporting Standard.<br> | |||
<br> | <br> | ||
Specific instructions and requirements for appropriate business use of the Internet are provided in the [[Sample Internet Acceptable Use Policy:|'''Sample Internet Acceptable Use Policy''']].<br> | |||
<br> | <br> | ||
Specific instructions and requirements for appropriate business use of the Company electronic mail system are provided in the [[Sample Electronic Mail Acceptable Use Standard:|'''Sample Electronic Mail Acceptable Use Standard''']] | |||
.<br> | |||
<br> | <br> | ||
Specific instructions and requirements for appropriate business use of telephones, pagers, faxes, and voice mail are provided in the [[Sample Telecommunication Acceptable Use Standard:|'''Sample Telecommunication Acceptable Use Standard''']].<br> | |||
<br> | <br> | ||
Specific instructions and requirements for appropriate business use of software and programs are provided in the [[Sample Software Acceptable Use Standard:|'''Sample Software Acceptable Use Standard''']].<br> | |||
<br> | <br> | ||
Specific instructions and requirements for appropriate business use of personal equipment within the Companies technology resources are provided in the [[Sample BYOD Acceptable Use Standard:|'''Sample BYOD Acceptable Use Standard''']].<br> | |||
<br> | <br> | ||
Specific instructions and requirements for appropriate business conduct and reporting procedures are provided in the [[Sample Misuse Reporting Standard:|'''Sample Misuse Reporting Standard''']].<br> | |||
<br> | <br> | ||
==Document Examples== | |||
Use these samples as a guide for your policy development. Fully customizable versions are available from [http://policy-machine.com The Policy Machine].<br> | |||
== | |||
The | |||
<br> | <br> | ||
<gallery> | |||
Image:End User Computing and Technology Policy.png|End User Computing and Technology Policy page one of six. | |||
Image:End User Computing and Technology Policy(1).png|End User Computing and Technology Policy page two of six. | |||
Image:End User Computing and Technology Policy(2).png|End User Computing and Technology Policy page three of six. | |||
Image:End User Computing and Technology Policy(3).png|End User Computing and Technology Policy page four of six. | |||
Image:End User Computing and Technology Policy(4).png|End User Computing and Technology Policy page five of six. | |||
Image:End User Computing and Technology Policy(5).png|End User Computing and Technology Policy page six of six. | |||
</gallery> |
Latest revision as of 14:58, 21 January 2014
Sample End User Computing and Technology Policy
The End User Computing and Technology Policy define the Company objectives for establishing specific standards on appropriate business use of the Company's information and telecommunications systems and equipment.
Objectives=
Company information and telecommunications systems and equipment, including Internet, electronic mail, telephone, pager, voice mail and fax, are provided for official and authorized Company business purposes. Any use of such systems and equipment perceived to be illegal, harassing, offensive, or in violation of other Company policies, standards or guidelines, or any other uses that would reflect adversely on Company, can be considered a violation of this policy.
The Company reserves the right to monitor, record, or periodically audit use of any of its information and telecommunications systems and equipment. Use of these systems and equipment constitutes expressed consent by those covered by the scope of this policy to such monitoring, recording, and auditing. Actual or suspected misuse of these systems should be reported to the appropriate Company management representative in a timely manner. Specific instructions and requirements for reporting misuse of Company information and telecommunications systems and equipment are provided in the Misuse Reporting Standard.
Specific instructions and requirements for appropriate business use of the Internet are provided in the Sample Internet Acceptable Use Policy.
Specific instructions and requirements for appropriate business use of the Company electronic mail system are provided in the Sample Electronic Mail Acceptable Use Standard
.
Specific instructions and requirements for appropriate business use of telephones, pagers, faxes, and voice mail are provided in the Sample Telecommunication Acceptable Use Standard.
Specific instructions and requirements for appropriate business use of software and programs are provided in the Sample Software Acceptable Use Standard.
Specific instructions and requirements for appropriate business use of personal equipment within the Companies technology resources are provided in the Sample BYOD Acceptable Use Standard.
Specific instructions and requirements for appropriate business conduct and reporting procedures are provided in the Sample Misuse Reporting Standard.
Document Examples
Use these samples as a guide for your policy development. Fully customizable versions are available from The Policy Machine.
-
End User Computing and Technology Policy page one of six.
-
End User Computing and Technology Policy page two of six.
-
End User Computing and Technology Policy page three of six.
-
End User Computing and Technology Policy page four of six.
-
End User Computing and Technology Policy page five of six.
-
End User Computing and Technology Policy page six of six.