The objectives of the Individual Computing Equipment Usage Policy are:
a. to help the Company Management enforce the rules regarding the use of individual computing equipment;
b. to identify the respective obligations and responsibilities of Company’s employees in the use of this technology.
CONTENT
1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. REQUIREMENTS
3.1 DESKTOPS AND LAPTOPS
3.2 MOBILE COMPUTING EQUIPMENT (LAPTOPS, TABLETS, SMARTPHONES, PDAS)
4. RESPONSIBILITIES
4.1 EMPLOYEES
4.2 MANAGERS
4.3 IT
5. EXCEPTIONS
6. FINAL CONSIDERATIONS
6.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
6.2 DOCUMENT REVISION
Pages: 11
This bundle contains all the products listed in the Data Governance section. Take advantage of the 25% OFF when buying the bundle!
The objective of the Cryptographic Controls Standard is to outline the minimum information security controls which must be applied when cryptographic services and solutions are utilized by the Company. Specifically, this Standard focuses on key management requirements, acceptable algorithms, appropriate key lengths, and raises pertinent regulatory considerations relating to the use of cryptography.
The objective of the Performance Appraisal Procedure is to describe the process of the biannual professional performance appraisal of the human resources from the Company.
Review Individual Computing Equipment Usage Policy.
You must be logged in to post a review.