The objective of the Internet Access Policy is to allow the secure and effective use of the Internet. This policy set the standard for appropriate behavior of users when accessing and using the Internet.
CONTENT
1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. REQUIREMENTS
4. RESPONSIBILITIES
4.1 USERS
4.2 MANAGEMENT
4.3 IT & NETWORK OPERATIONS
5. EXCEPTIONS
6. FINAL CONSIDERATIONS
6.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
6.2 DOCUMENT REVISION
Pages: 9
The Clean Desk Procedure was developed by the Company in order to protect classified information, company's goods and employees’ personal goods, as well as to reduce the risk of fire, incidental floods or any other damaging events.
The Compliance with Legal Requirements Policy is designed to avoid breaches of any criminal and civil law, statutory, regulatory or contractual obligations and of any security requirements.
The Security Incident Management Standard sets the minimum requirements for security incident management in support of the IT Risk Policy for Information Security, including requirements for analyzing, handling and reporting of security incidents.
Review Internet Access Policy.
You must be logged in to post a review.