Solved

Technology Usage Document

Posted on 2013-05-13
3
236 Views
Last Modified: 2013-05-22
I am Looking to Deploy A Technology Usage Document with all of my Clients.

This is to Help the Client Keep issues down from renegade employees who do just about

anything on company time with company computers.

If you have any Samples to Share or any Sites that Can Help me would be Great!!!

Cjoego
0
Comment
Question by:Joseph Salazar
3 Comments
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 39165077
Acceptable Use policies are all over the internet, you should be able to find many more than this:
http://www.sans.org/security-resources/policies/
http://www.sans.org/reading_room/whitepapers/policyissues/acceptable-policy-document_369
-rich
0
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 39166808
I see mainly insider threats coverage and abuse of rights and privileges too. Thought may be good to see how other address in their sharing


Sample policies (wide coverage to specific domain of interest)
http://www.dmoz.org/Computers/Security/Policy/Sample_Policies/

Internet Usage Policy
http://www.osa.state.ms.us/downloads/iupg.pdf

Acceptable Usage Policy
http://www.getsafeonline.org/themes/site_themes/getsafeonline//download_centre/Sample_Acceptable_Usage_Policy.pdf

How to Write a Security Policy  
http://www.isaca.org/Journal/Past-Issues/2009/Volume-1/Pages/JOnline-How-to-Write-a-Security-Policy.aspx

Writing information security policies is an art form. Anyone who thinks that their organization’s 80-page security manual underwent writing and approval in a couple of days should think again.
0
 

Author Closing Comment

by:Joseph Salazar
ID: 39189781
Fantastic Documents I can Edit and use today.

Thanks breadtan

Cjoego
0

Featured Post

Networking for the Cloud Era

Join Microsoft and Riverbed for a discussion and demonstration of enhancements to SteelConnect:
-One-click orchestration and cloud connectivity in Azure environments
-Tight integration of SD-WAN and WAN optimization capabilities
-Scalability and resiliency equal to a data center

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question