INFOSEC Acceptable Use Policy

Here is one company's acceptable use policy. Notice that even though this is the most essential security policy you will write, this one is relatively short.

1.0 Overview

INFOSEC's intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to 's established culture of openness, trust, and integrity. INFOSEC is committed to protecting 's employees, partners, and the company from illegal or damaging actions by individuals, either knowingly or unknowingly.

Internet/intranet/extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, WWW browsing, and FTP, are the property of . These systems are to be used for business purposes in serving the interests of the company and of our clients and customers in the course of normal operations. Please review Human Resources policies for further details.

Effective security is a team effort involving the participation and support of every employee and affiliate who deals with information and/or information systems. It is the responsibility of all computers user to know these guidelines and to conduct their activities accordingly.

2.0 Purpose

The purpose of this policy is to outline the acceptable use of computer equipment at . These rules are in place to protect the employee and . Inappropriate use exposes to risks, including virus attacks, compromise of network systems and services, and legal issues.

3.0 Scope

This policy applies to employees, contractors, consultants, temporaries, and other workers at , including all personnel affiliated with third parties. This policy applies to all equipment that is owned or leased by .

4.0 Policy

4.1 General Use and Ownership

4.2 Security and Proprietary Information

4.3 Unacceptable Use

The following activities are, in general, prohibited. Employees can be exempted from these restrictions during the course of their legitimate job responsibilities. (For example, systems administration staff might have a need to disable the network access of a host if that host is disrupting production services.)

Under no circumstances is an employee of authorized to engage in any activity that is illegal under local, state, federal, or international law while utilizing -owned resources.

The following lists are by no means exhaustive, but they attempt to provide a framework for activities that fall into the category of unacceptable use.

System and Network Activities

The following activities are strictly prohibited with no exceptions:

E-mail and Communications Activities

5.0 Enforcement

Any employee found to have violated this policy can be subject to disciplinary action, up to and including termination of employment.

6.0 Definitions

Term

Definition

Spam

Unauthorized and/or unsolicited electronic mass mailings.

 

7.0 Revision History

Категории