Issue specific security policies are designed to focus on areas of current and important concerns to an organization's operation. Further, such policy may focus on a firm's contingency plan, risk, acceptable use and so forth. Below is a sample of issue specific security policy for an organization.
Title:
Responsible use of First-trade’s Wireless LAN Technology
This
document is intended for internal use only.
OMA Technology is an ISP
provider with the mission of providing high quality and affordable internet
service to its constituents.
Scope
The policy stated in this
document is intended for the safe use of OMA Wireless Technologies. The policy
addresses the safe use of the company's hardware, software, and protocols
associated with WLANs. This document is intended for authorized users within
OMA Technologies only. This document is not meant for external consumption.
Authorized users are defined as anyone with granted access to OMA Technologies
infrastructures.
Policy
The use of devices
including laptops, Smartphones, Flash drive are permitted, are allowed with
prior approval from management to use such device within the facility of
First-trade. Internet access is restricted to job use only; any personal use is
not permitted. First trade retains the right to access any data transmitted
within its network. Any private use of OMA internet service must be approved
before such use. Use of non-standard devices including hardware, software and
protocols are strictly forbidden by First-trade. Accessing unauthorized
websites, emails, downloading, copying or pirating software and electronic
files that are copyrighted or without authorization is extremely
prohibited. In the event of
inappropriate use of OMA wireless technologies, OMA reserves the right to take
whatever steps necessary for the particular situation including, but not
limited to, termination of employment and legal action.
Disclaimer
OMA assumes no liability
for unauthorized acts that violate legal local, states or federal laws. In the
event of such laws being violated, OMA holds the right to terminate its
relationship with such employee or violator and will provide no legal assistance in such instances.
EMPLOYEE ACKNOWLEDGEMENT
FORM
I have received, read and
understand the Information Security Policy. I understand that it is my
responsibility to comply with it.
Printed name:
___________________________________________
Signature: _____________________________________________
Date:
__________________________________________________
References
GFI Software, (2016).
Sample of internet usage policy. Retrieved from:
http://www.gfi.com/pages/sample-internet-usage-policy
Whitman, E., &
Mattord, J., (2010). Management of Information Security (Page 183). Cengage
Textbook. Kindle Edition.
No comments:
Post a Comment