Sample New Hire Security Awareness Standard:: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
No edit summary
No edit summary
Line 29: Line 29:
Image:End User Computing and Technology Policy(5).png|End User Computing and Technology Policy page six of six.
Image:End User Computing and Technology Policy(5).png|End User Computing and Technology Policy page six of six.
</gallery>
</gallery>
[[file:End User Computing and Technology Policy.png]]
[[file:End User Computing and Technology Policy(1).png]]
[[file:End User Computing and Technology Policy(2).png]]
[[file:End User Computing and Technology Policy(3).png]]
[[file:End User Computing and Technology Policy(4).png]]
[[file:End User Computing and Technology Policy(5).png]]

Revision as of 14:55, 21 January 2014

Sample End User Computing and Technology Policy

The End User Computing and Technology Policy define the Company objectives for establishing specific standards on appropriate business use of the Company's information and telecommunications systems and equipment.

Objectives

Company provided technology based resources, including Internet, electronic mail, software, telecommunications, voice mail and fax, are provided for official and authorized Company business purposes. Any use of such systems and equipment perceived to be illegal, harassing, offensive, or in violation of other Company policies, standards or guidelines, or any other uses that would reflect adversely the Company, can be considered a violation of this policy.

The Company reserves the right to monitor, record, or periodically audit use of any of its information and telecommunications systems and equipment. Use of these systems and equipment constitutes expressed consent by those covered by the scope of this policy to such monitoring, recording, and auditing. Actual or suspected misuse of these systems should be reported to the appropriate Company management representative in a timely manner.

Specific instructions and requirements for reporting misuse of Company information and telecommunications systems and equipment are provided in the Misuse Reporting Standard.

Specific instructions and requirements for appropriate business use of the Internet are provided in the Internet Acceptable Use Standard.

Specific instructions and requirements for appropriate business use of the Company electronic mail system are provided in the Electronic Mail Acceptable Use Standard.

Specific instructions and requirements for appropriate business use of telecommunications, faxes, and voice mail are provided in the Telecommunication Acceptable Use Standard.

Specific instructions and requirements for appropriate business use of software and programs are provided in the Software Acceptable Use Standard.

Document Examples

Use these samples as a guide for your policy development. Fully customizable versions are available from The Policy Machine.