Desktop Usage Policy

Desktop Usage Policy

The Desktop Usage Policy is intended to maintain the security of Company information processing on desktop computers equipment against the risks (reputation, commercial, legally, privacy, loss of productivity and others) associated with the exposure or loss of sensitive, unique or personal information the computer contained, or to the exposure of misuse of the computing platform.

CONTENT

1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. REQUIREMENTS
4. RESPONSIBILITIES
4.1 EMPLOYEES
4.2 MANAGERS
4.3 IT DEPARTMENT
5. EXCEPTIONS
6. FINAL CONSIDERATIONS
6.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
6.2 DOCUMENT REVISION

Pages: 8

Review Desktop Usage Policy.

Your email address will not be published. Required fields are marked *

Related Products:

€829.99

Purchase

This bundle contains all the products listed in the Risk Management section. Take advantage of the 25% OFF when buying the bundle!

€49.99

Purchase

The Ethics Procedure defines the basic standards of business behavior and ethics that Company’s employees engaged or not in relations with third parties have to comply with. Third parties are considered: Company customers, Company suppliers, other Company business partners, Company shareholders, other stakeholders, competitors.

€49.99

Purchase

The objective of the Network Security Policy is to ensure the security of data transfers across Company’s networks and that an adequate level of security exists to protect the network infrastructure.

Get  Your Free Sample

Please use the form below to subscribe to our list and receive a free procedure template!
GET YOUR FREE TEMPLATE
>
close-link