THIS IS A SAMPLE! Feel free to use or modify it for your own use! Want a Policies and Procedures Wiki like this? Sign up for a Staff.Wiki trial by clicking here.

Software Installation Policy

Overview

Allowing employees to install software on company computing devices opens the organization up to unnecessary exposure. Conflicting file versions or DLLs which can prevent programs from running, the introduction of malware from infected installation software, unlicensed software which could be discovered during audit, and programs which can be used to hack the organization’s network are examples of the problems that can be introduced when employees install software on company equipment.

Purpose

The purpose of this policy is to outline the requirements around installations software on (^Company^) owned computing devices. To minimize the risk of loss of program functionality, the exposure of sensitive information contained within (^Company^)'s computing network, the risk of introducing malware, and the legal exposure of running unlicensed software.

Scope

This policy applies to all (^Company^) employees, contractors, vendors and agents with a (^Company^)-owned mobile devices. This policy covers all computes, servers, smartphones, tablets and other computing devices operating within (^Company^).

Policy

  • Employees may not install software on (^Company^)'s computing devices operated within the (^Company^) network. 

  • Software requests must first be approved by the requester’s manager and then be made to the Information Technology department or Help Desk in writing or via email. 

  • Software must be selected from an approved software list, maintained by the Information Technology department, unless no selection on the list meets the requester’s need. 

  • The Information Technology Department will obtain and track the licenses, test new software for conflict and compatibility, and perform the installation

Policy Compliance

Compliance Measurement
The Infosec team will verify compliance to this policy through various methods, including but not limited to, periodic walk-throughs, video monitoring, business tool reports, internal and external audits, and feedback to the policy owner.

Exceptions
Any exceptions to the policy must be approved by the Infosec team in advance.

Non-Compliance
An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.

Want a Policies & Procedures Wiki like this? Sign up and try Staff.Wiki by clicking here.


Next Topic:
v6.0.0.14094
Up Since 5/7/2024 10:53:17 PM