Solved

Technology Usage Document

Posted on 2013-05-13
3
238 Views
Last Modified: 2013-05-22
I am Looking to Deploy A Technology Usage Document with all of my Clients.

This is to Help the Client Keep issues down from renegade employees who do just about

anything on company time with company computers.

If you have any Samples to Share or any Sites that Can Help me would be Great!!!

Cjoego
0
Comment
Question by:Joseph Salazar
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 39165077
Acceptable Use policies are all over the internet, you should be able to find many more than this:
http://www.sans.org/security-resources/policies/
http://www.sans.org/reading_room/whitepapers/policyissues/acceptable-policy-document_369
-rich
0
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 39166808
I see mainly insider threats coverage and abuse of rights and privileges too. Thought may be good to see how other address in their sharing


Sample policies (wide coverage to specific domain of interest)
http://www.dmoz.org/Computers/Security/Policy/Sample_Policies/

Internet Usage Policy
http://www.osa.state.ms.us/downloads/iupg.pdf

Acceptable Usage Policy
http://www.getsafeonline.org/themes/site_themes/getsafeonline//download_centre/Sample_Acceptable_Usage_Policy.pdf

How to Write a Security Policy  
http://www.isaca.org/Journal/Past-Issues/2009/Volume-1/Pages/JOnline-How-to-Write-a-Security-Policy.aspx

Writing information security policies is an art form. Anyone who thinks that their organization’s 80-page security manual underwent writing and approval in a couple of days should think again.
0
 

Author Closing Comment

by:Joseph Salazar
ID: 39189781
Fantastic Documents I can Edit and use today.

Thanks breadtan

Cjoego
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Website and email setup 4 61
save browser passwords 11 84
How to get latest vulnerabilities advisories by email. 3 73
ow do I browse the internet secretly? 6 56
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
No single Antivirus application (despite claims by manufacturers) will catch or protect you from all Virus / Malware or Spyware threats. That doesn't stop you from further protecting yourself however - and this article is to show you how.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question