Monitoring of System Use Policy

Monitoring of System Use Policy

The main purposes of the Monitoring of System Use Policy is to maintain the confidentiality, integrity and availability of information processing and communication services, to detect failures and unauthorized activities and to define guidelines for the implementation of on-going review and monitoring activities at Company.

Company’s  information resources (computer, network and information assets) must have internal controls for auditing, monitoring and tracking their use. Therefore, the violation of Company’s policies and standards, or a violation of any law and regulation, shall be grounds for disciplinary action up to and including dismissal of an employee, termination of contract and possible civil action against a contractor, agent, supplier or supplier’s employees and subcontractors (at Company’s option). Company’s information resources including, but not limited to, voice networks, data network, electronic mail and voice mail are the property of the Company. As such, the Company has the right to audit/ inspect any or all of its information resources, including software used by employees, contractors, suppliers and agents in the performance of their work for the Company.

CONTENT

1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. REQUIREMENTS
4. RESPONSIBILITIES
4.1 SYSTEM ADMINISTRATORS
4.2 SYSTEM OWNERS
5. EXCEPTIONS
6. FINAL CONSIDERATIONS
6.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
6.2 DOCUMENT REVISION

Pages: 9

Review Monitoring of System Use Policy.

Related Products:

€1,549.99

Purchase

This bundle contains all the products listed in the Operations Management section. Take advantage of the 25% OFF when buying the bundle!

€49.99

Purchase

The objective of this policy is to define standards, procedures, and restrictions for end users who are connecting a personally-owned device to Company’s organization network for business purposes.

€49.99

Purchase

The objective of the Third Party Access Policy is to maintain the security of information processing facilities of Company accessed by third parties.

Get  Your Free Sample

Please use the form below to subscribe to our list and receive a free procedure template!
GET YOUR FREE TEMPLATE
>
close-link