The Desktop Usage Policy is intended to maintain the security of Company information processing on desktop computers equipment against the risks (reputation, commercial, legally, privacy, loss of productivity and others) associated with the exposure or loss of sensitive, unique or personal information the computer contained, or to the exposure of misuse of the computing platform.
CONTENT
1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. REQUIREMENTS
4. RESPONSIBILITIES
4.1 EMPLOYEES
4.2 MANAGERS
4.3 IT DEPARTMENT
5. EXCEPTIONS
6. FINAL CONSIDERATIONS
6.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
6.2 DOCUMENT REVISION
Pages: 8
This bundle contains all the products listed in the Risk Management section. Take advantage of the 25% OFF when buying the bundle!
The Ethics Procedure defines the basic standards of business behavior and ethics that Company’s employees engaged or not in relations with third parties have to comply with. Third parties are considered: Company customers, Company suppliers, other Company business partners, Company shareholders, other stakeholders, competitors.
The objective of the Network Security Policy is to ensure the security of data transfers across Company’s networks and that an adequate level of security exists to protect the network infrastructure.
Review Desktop Usage Policy.
You must be logged in to post a review.