?
Solved

Technology Usage Document

Posted on 2013-05-13
3
Medium Priority
?
256 Views
Last Modified: 2013-05-22
I am Looking to Deploy A Technology Usage Document with all of my Clients.

This is to Help the Client Keep issues down from renegade employees who do just about

anything on company time with company computers.

If you have any Samples to Share or any Sites that Can Help me would be Great!!!

Cjoego
0
Comment
Question by:Joseph Salazar
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 39165077
Acceptable Use policies are all over the internet, you should be able to find many more than this:
http://www.sans.org/security-resources/policies/
http://www.sans.org/reading_room/whitepapers/policyissues/acceptable-policy-document_369
-rich
0
 
LVL 64

Accepted Solution

by:
btan earned 2000 total points
ID: 39166808
I see mainly insider threats coverage and abuse of rights and privileges too. Thought may be good to see how other address in their sharing


Sample policies (wide coverage to specific domain of interest)
http://www.dmoz.org/Computers/Security/Policy/Sample_Policies/

Internet Usage Policy
http://www.osa.state.ms.us/downloads/iupg.pdf

Acceptable Usage Policy
http://www.getsafeonline.org/themes/site_themes/getsafeonline//download_centre/Sample_Acceptable_Usage_Policy.pdf

How to Write a Security Policy  
http://www.isaca.org/Journal/Past-Issues/2009/Volume-1/Pages/JOnline-How-to-Write-a-Security-Policy.aspx

Writing information security policies is an art form. Anyone who thinks that their organization’s 80-page security manual underwent writing and approval in a couple of days should think again.
0
 

Author Closing Comment

by:Joseph Salazar
ID: 39189781
Fantastic Documents I can Edit and use today.

Thanks breadtan

Cjoego
0

Featured Post

Get real performance insights from real users

Key features:
- Total Pages Views and Load times
- Top Pages Viewed and Load Times
- Real Time Site Page Build Performance
- Users’ Browser and Platform Performance
- Geographic User Breakdown
- And more

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A look at what happened in the Verizon cloud breach.
Let's recap what we learned from yesterday's Skyport Systems webinar.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Suggested Courses
Course of the Month13 days, 13 hours left to enroll

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question