Sample New Hire Security Awareness Standard:

From HORSE - Holistic Operational Readiness Security Evaluation.
Revision as of 14:58, 21 January 2014 by Mdpeters (talk | contribs) (→‎Objectives)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Sample End User Computing and Technology Policy

The End User Computing and Technology Policy define the Company objectives for establishing specific standards on appropriate business use of the Company's information and telecommunications systems and equipment.

Objectives=


Company information and telecommunications systems and equipment, including Internet, electronic mail, telephone, pager, voice mail and fax, are provided for official and authorized Company business purposes. Any use of such systems and equipment perceived to be illegal, harassing, offensive, or in violation of other Company policies, standards or guidelines, or any other uses that would reflect adversely on Company, can be considered a violation of this policy.

The Company reserves the right to monitor, record, or periodically audit use of any of its information and telecommunications systems and equipment. Use of these systems and equipment constitutes expressed consent by those covered by the scope of this policy to such monitoring, recording, and auditing. Actual or suspected misuse of these systems should be reported to the appropriate Company management representative in a timely manner. Specific instructions and requirements for reporting misuse of Company information and telecommunications systems and equipment are provided in the Misuse Reporting Standard.

Specific instructions and requirements for appropriate business use of the Internet are provided in the Sample Internet Acceptable Use Policy.

Specific instructions and requirements for appropriate business use of the Company electronic mail system are provided in the Sample Electronic Mail Acceptable Use Standard .

Specific instructions and requirements for appropriate business use of telephones, pagers, faxes, and voice mail are provided in the Sample Telecommunication Acceptable Use Standard.

Specific instructions and requirements for appropriate business use of software and programs are provided in the Sample Software Acceptable Use Standard.

Specific instructions and requirements for appropriate business use of personal equipment within the Companies technology resources are provided in the Sample BYOD Acceptable Use Standard.

Specific instructions and requirements for appropriate business conduct and reporting procedures are provided in the Sample Misuse Reporting Standard.

Document Examples

Use these samples as a guide for your policy development. Fully customizable versions are available from The Policy Machine.