The Email Usage Policy was developed by Company in order to allow the secure and effective use of the electronic mail (e-mail) service inside and outside Company. This policy set the standard for appropriate behavior of a Company employee when using the e-mail service and this applies to all employees.
1.1 PROCEDURE OWNER
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3.1 PROHIBITED USE
3.3 RULES FOR USING E-MAIL
4. ROLES AND RESPONSIBILITIES
6. FINAL CONSIDERATIONS
6.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
6.2 DOCUMENT REVISION
The objective of the Change Management and Testing Procedure is to define the approach and overall framework for software developments and the way they are implemented within the Company.
The objective of the Cryptographic Controls Standard is to outline the minimum information security controls which must be applied when cryptographic services and solutions are utilized by the Company. Specifically, this Standard focuses on key management requirements, acceptable algorithms, appropriate key lengths, and raises pertinent regulatory considerations relating to the use of cryptography.