THIS IS A SAMPLE! Feel free to use or modify it for your own use! Want a Policies and Procedures Wiki like this? Sign up for a Staff.Wiki trial by clicking here.

Acceptable Use Policy

Overview

Infosec’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to (^Company^)’s established culture of openness, trust and integrity. Infosec is committed to protecting (^Company^)'s employees, partners and the company from illegal or damaging actions by individuals, either knowingly or unknowingly.

Internet/Intranet/Extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, WWW browsing, and FTP, are the property of (^Company^). These systems are to be used for business purposes in serving the interests of the company, and of our clients and customers in the course of normal operations. Please review Human Resources policies for further details.

Effective security is a team effort involving the participation and support of every (^Company^) employee and affiliate who deals with information and/or information systems. It is the responsibility of every computer user to know these guidelines, and to conduct their activities accordingly.

Purpose

The purpose of this policy is to outline the acceptable use of computer equipment at (^Company^). These rules are in place to protect the employee and (^Company^). Inappropriate use exposes (^Company^) to risks including virus attacks, compromise of network systems and services, and legal issues.

Scope

This policy applies to the use of information, electronic and computing devices, and network resources to conduct (^Company^) business or interact with internal networks and business systems, whether owned or leased by (^Company^), the employee, or a third party. All employees, contractors, consultants, temporary, and other workers at (^Company^) and its subsidiaries are responsible for exercising good judgment regarding appropriate use of information, electronic devices, and network resources in accordance with (^Company^) policies and standards, and local laws and regulation. Exceptions to this policy are documented in section 5.2

This policy applies to employees, contractors, consultants, temporaries, and other workers at (^Company^), including all personnel affiliated with third parties. This policy applies to all equipment that is owned or leased by (^Company^).

Want a Policies & Procedures Wiki like this? Sign up and try Staff.Wiki by clicking here.


Next Topic:
v6.0.0.14101
Up Since 9/7/2024 12:19:50 AM