INFORMATION SYSTEMS USAGE policy

Outline

Page 1 / 2

...............................................9 Company Representation.....................................................................................................................................................................................................................................................................13 6............................3 Consequences of Inappropriate Usage....................................................................................................6 5.......10 5.....................................................................................................................................................9 Password management guidelines....................................11 6 PRIVACY...............4 Inappropriate Internet Usage................................................................1 Monitoring and Auditing System Use......................................................................................................................................................15 9..............................................7 5..........................................................................................................................15 9..........................................................................................................................15 10.................................3 3 POLICY........................................................................2...........................................1 Usage Monitoring..........................................................................8 5........................................................................................................................1 Employees and other Users of the Company Information System..................................................15 9.................................................................Outline 1 CONTEXT............................................................................Approval 16 Page 2 / 2 .......................................................................................................................Smart Phone .......13 7......................................................................................................3 Legal Requests.........................................................................15 9 ACCOUNTABILITIES...........................8 Company Provided Networks for Business Hours Access........................ ............................13 7 PROCEDURE....................................7 5.....................................................................................................................................2 Monitoring and Auditing Internet use.................................................................................................13 6...........................................3 4 DEFINITIONS.................... .7 Security......................................6 5............................1.............................................................................................................8 Company Provided Networks for After Business Hours Access..............................................................5 Personal Use.........................................................................................................................................6 Software Licensing and Copyright................................................................................................................................Audit & Review 15 10.............2 Intellectual Property Ownership............... REVIEW & APPROVAL..............................................................................................................2 Managers...........................................................................................................................................................................10.2 Inappropriate Email Usage........................................................................................................................... ..............................................................................................................................................................................................................1 Email Usage......................................................14 8 RELATED POLICIES AND DOCUMENTS...........................6 5.............................................................................................................................................................................................................. ..........................................10 5..13 7..................................................................8 5.....................9 5............................................15 10 AUDIT........13 6......................................8 Remote Access..........................................................3 Internet Usage.....................................................................................................................3 2 SCOPE....................................................4 5 STANDARDS.........................................3 Supervisors......14 7...............

Sign up to vote on this title
UsefulNot useful