It Security

Submitted by: Submitted by

Views: 611

Words: 4718

Pages: 19

Category: Science and Technology

Date Submitted: 06/11/2011 06:40 PM

Report This Essay

Information Security Policy

1

LedGrafix Corporate Information Security Policy By Jason Collins 10/18/2006

Information Security Policy

2

Table of Contents Introduction Scope Violations and Penalties Acceptable Use Unacceptable Use Internet and e-mail use Remote access policy User accounts and passwords Employee Termination Physical security Security user awareness program Contact Information Employee Acknowledgement Appendixes Revision history References pg. 3 pg. 3 pg. 3 pg. 3 pg. 3 pg. 3-4 pg. 4 pg. 4-5 pg. 6 pg. 6 pg. 7 pg. 7 pg. 8 pg. 9-24 pg. 25 pg. 25

Information Security Policy LedGrafix Corporate Security Policy Introduction

3

Computer information systems and networks are an integral part of business at LedGrafix. The company has made a substantial investment in human and financial resources to create these systems. The enclosed policies and directives have been established in order to protect the employee and LedGrafix. Inappropriate use exposes LedGrafix to risks including, but not limited to, virus attacks, compromise of network systems and services, and legal issues. Scope This policy applies to anyone who has a user account provided by LedGrafix, uses LedGrafix owned computer equipment, or is employed by LedGrafix. Violations and Penalties Violations may result in disciplinary action in accordance with company policy. Failure to observe these guidelines may result in disciplinary action by the company depending upon the type and severity of the violation, whether it causes any liability or loss to the company, and/or the presence of any repeated violation(s). Acceptable use All users of company assets and resources of any kind are expected to conduct themselves in a responsible, legal, non-threatening manner at all times, for example: • Users are responsible for adhering to copyright laws and license agreements. • Users are expected to use the company equipment, internet, email, and anything else company owned or supplied for...