Policies
Topics
Types of Content
Employee Status Change Policy and FormEmployee status can change for a variety of reasons, including promotion, leave of absence, transfer, termination, or change in pay. When a status change occurs, there is a... |
|
Travel Expense PolicyEnsure that traveling employees are aware of what is considered an acceptable expense and what expenses are eligible for reimbursement by the organization. Establish... |
|
Personal Social Media Acceptable Use PolicySocial media is used by many as means of sharing information, communicating, and connecting with others. The use of social media at work for personal reasons is a... |
|
Business Expense Reimbursement PolicyIn many organizations, employees sometimes have to make purchases on behalf of the organization. In these situations, employees should be aware of the procedures for... |
|
Technology Use Monitoring PolicyMany organizations monitor the usage of technology to ensure compliance with regulation, organizational policy, and law. Monitoring technology usage is a delicate exercise,... |
|
Telephone and Voicemail Acceptable Use PolicyTelephony is one technology often taken for granted. As a result, it is very easy for employees to intentionally or inadvertently misuse telephony tools for non-business... |
|
Administrative Rights PolicyThe decision whether or not to grant computer end users administrative rights is hotly contested, and irritating to enforce. However, in an environment where security is a... |
|
Internet Acceptable Use PolicyMost organizations that provide Internet access to their employees have put in place an Internet Acceptable Use Policy. Some of these policies have been in place,... |
|
Software Installation PolicyThe goal of a Software Installation Policy is to identify permitted standard software titles, clearly communicate what is prohibited, and outline proper procedures for... |
|
Password PolicyPasswords are the primary form of user authentication used to grant access to information systems. To ensure that passwords provide as much security as possible they must... |
|