Solved

Technology Usage Document

Posted on 2013-05-13
3
231 Views
Last Modified: 2013-05-22
I am Looking to Deploy A Technology Usage Document with all of my Clients.

This is to Help the Client Keep issues down from renegade employees who do just about

anything on company time with company computers.

If you have any Samples to Share or any Sites that Can Help me would be Great!!!

Cjoego
0
Comment
Question by:Joseph Salazar
3 Comments
 
LVL 38

Expert Comment

by:Rich Rumble
Comment Utility
Acceptable Use policies are all over the internet, you should be able to find many more than this:
http://www.sans.org/security-resources/policies/
http://www.sans.org/reading_room/whitepapers/policyissues/acceptable-policy-document_369
-rich
0
 
LVL 61

Accepted Solution

by:
btan earned 500 total points
Comment Utility
I see mainly insider threats coverage and abuse of rights and privileges too. Thought may be good to see how other address in their sharing


Sample policies (wide coverage to specific domain of interest)
http://www.dmoz.org/Computers/Security/Policy/Sample_Policies/

Internet Usage Policy
http://www.osa.state.ms.us/downloads/iupg.pdf

Acceptable Usage Policy
http://www.getsafeonline.org/themes/site_themes/getsafeonline//download_centre/Sample_Acceptable_Usage_Policy.pdf

How to Write a Security Policy  
http://www.isaca.org/Journal/Past-Issues/2009/Volume-1/Pages/JOnline-How-to-Write-a-Security-Policy.aspx

Writing information security policies is an art form. Anyone who thinks that their organization’s 80-page security manual underwent writing and approval in a couple of days should think again.
0
 

Author Closing Comment

by:Joseph Salazar
Comment Utility
Fantastic Documents I can Edit and use today.

Thanks breadtan

Cjoego
0

Featured Post

Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
It’s a strangely common occurrence that when you send someone their login details for a system, they can’t get in. This article will help you understand why it happens, and what you can do about it.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now