The Desktop Usage Policy is intended to maintain the security of Company information processing on desktop computers equipment against the risks (reputation, commercial, legally, privacy, loss of productivity and others) associated with the exposure or loss of sensitive, unique or personal information the computer contained, or to the exposure of misuse of the computing platform.
1.1 PROCEDURE OWNER
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
4.3 IT DEPARTMENT
6. FINAL CONSIDERATIONS
6.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
6.2 DOCUMENT REVISION
The Ethics Procedure defines the basic standards of business behavior and ethics that Company’s employees engaged or not in relations with third parties have to comply with. Third parties are considered: Company customers, Company suppliers, other Company business partners, Company shareholders, other stakeholders, competitors.
The objective of the Network Security Policy is to ensure the security of data transfers across Company’s networks and that an adequate level of security exists to protect the network infrastructure.