Mobile phones, smartphones, and related technology are invaluable business tools. However, without clear policies in place these tools may become liabilities. Use this...
|
|
Working off-site is often convenient, but employees still need access to network resources from remote locations. Access needs to be managed with the best interests of...
|
|
The decision whether or not to grant computer end users administrative rights is hotly contested, and irritating to enforce. However, in an environment where security is...
|
|
This template provides enterprises with a measuring-stick against which to weigh existing policy, as well as a foundation for new enterprises designing this policy for...
|
|
Most organizations that provide Internet access to their employees have put in place an Internet Acceptable Use Policy. Some of these policies have been in place,...
|
|
Printing is an essential business function, yet it is often not closely governed, leading to exorbitant and unnecessary costs. Develop and implement a printer policy to...
|
|
The goal of a Software Installation Policy is to identify permitted standard software titles, clearly communicate what is prohibited, and outline proper procedures for...
|
|
Many organizations monitor the usage of technology to ensure compliance with regulation, organizational policy, and law. Monitoring technology usage is a delicate...
|
|
Telephony is one technology often taken for granted. As a result, it is very easy for employees to intentionally or inadvertently misuse telephony tools for non-business...
|
|
Passwords are the primary form of user authentication used to grant access to information systems. To ensure that passwords provide as much security as possible they must...
|
|