The objective of the Internet Access and Usage Policy is to define standards for systems that monitor and limit web use from any host within Company’s network. These standards are designed to ensure employees use the Internet in a safe and responsible manner, and ensure that employee web use can be monitored or researched during an incident.
The Company provides its staff with Internet access facility as required for the performance and fulfillment of job responsibilities. This facility is for the purpose of increasing productivity and for the conduct of business activities.
The Company has adopted the following Internet Access and Usage Policy as a measurement to define professional ways of using Internet to prevent misuse of company’s Internet access facility and to mitigate the risk of critical information divulgence.
CONTENT
1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. POLICY
3.1 INTERNET USAGE
3.2 GENERAL GUIDELINES
3.3 CONFIDENTIAL INFORMATION
3.4 DOWNLOADS AND UPLOADS
3.5 INTERNET ACCESS ACCOUNTS
3.6 NEWSGROUPS/ FORUMS
3.7 PERSONAL USE
3.8 INTERNET ACCESS MONITORING
4. FILTERING POLICY
4.1 INTERNET ACCESS
4.2 FORBIDDEN PAGES
5. BEST PRACTICES ON INTERNET SURFING
6. POLICY ENFORCEMENT AND ADHERENCE
7. EXCEPTIONS
8. FINAL CONSIDERATIONS
8.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
8.2 DOCUMENT REVISION
Pages: 14
The Company has adopted an Information Risk Management Policy (“Policy”) to describe rules and expectations for both itself and all its direct and indirect subsidiaries countrywide (together with the Company) concerning roles and responsibilities for identifying and reducing risks associated with the loss of confidentiality, integrity, or availability of Company’s Data (“Information Risk”).
This standard documents the security requirements for Company’s Application Security and Development. This standard is aligned to Company’s Systems Management Policy and must be applied to all applications written and developed for the Company.
The Application Security Architecture Guidelines is a walkthrough on the security concepts of application architecture.
Review Internet Access and Usage Policy.
You must be logged in to post a review.