The objective of the Internet Access and Usage Policy is to define standards for systems that monitor and limit web use from any host within Company’s network. These standards are designed to ensure employees use the Internet in a safe and responsible manner, and ensure that employee web use can be monitored or researched during an incident.
The Company provides its staff with Internet access facility as required for the performance and fulfillment of job responsibilities. This facility is for the purpose of increasing productivity and for the conduct of business activities.
The Company has adopted the following Internet Access and Usage Policy as a measurement to define professional ways of using Internet to prevent misuse of company’s Internet access facility and to mitigate the risk of critical information divulgence.
1.1 PROCEDURE OWNER
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3.1 INTERNET USAGE
3.2 GENERAL GUIDELINES
3.3 CONFIDENTIAL INFORMATION
3.4 DOWNLOADS AND UPLOADS
3.5 INTERNET ACCESS ACCOUNTS
3.6 NEWSGROUPS/ FORUMS
3.7 PERSONAL USE
3.8 INTERNET ACCESS MONITORING
4. FILTERING POLICY
4.1 INTERNET ACCESS
4.2 FORBIDDEN PAGES
5. BEST PRACTICES ON INTERNET SURFING
6. POLICY ENFORCEMENT AND ADHERENCE
8. FINAL CONSIDERATIONS
8.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
8.2 DOCUMENT REVISION
This bundle contains all the products listed in the Risk Management section. Take advantage of the 25% OFF when buying the bundle!
This standard documents the security requirements for Company’s Application Security and Development. This standard is aligned to Company’s Systems Management Policy and must be applied to all applications written and developed for the Company.
This Backup and Recovery Standard defines the minimum controls to ensure that Company’s information is available for critical processing through the implementation of controls ensuring that business information is backed-up and restorable when data on primary processing media is lost or corrupted.
Review Internet Access and Usage Policy.
You must be logged in to post a review.