Solved

Acceptable Use Policy

Posted on 2006-11-28
3
226 Views
Last Modified: 2010-04-11
I am working at a company that I started the IT department from the ground up.  Now that we are 100+ people, we REALLY need an acceptable use policy.  I was wondering if anyone had any links to webpages that have some good acceptable use policies that outline security.  I know that it won't be a perfect fit for our needs, but I want an idea of what people usually do.

Thanks
0
Comment
Question by:rustyrpage
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 6

Accepted Solution

by:
ryandale56 earned 250 total points
ID: 18033185
0
 
LVL 38

Assisted Solution

by:Rich Rumble
Rich Rumble earned 250 total points
ID: 18034300
All the policies you need right here: http://www.sans.org/resources/policies/
-rich
0
 
LVL 6

Author Comment

by:rustyrpage
ID: 18037311
Thank you for your quick response!  I will read them over, but it ought to get me going!
0

Featured Post

IoT Devices - Fast, Cheap or Secure…Pick Two

The IoT market is growing at a rapid pace and manufacturers are under pressure to quickly provide new products. Can you be sure that your devices do what they're supposed to do, while still being secure?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
Make the most of your online learning experience.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Suggested Courses
Course of the Month7 days, 14 hours left to enroll

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question