Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.
Internet Usage
The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the …show more content…
At no time should the workstation be used for personal email use, (i.e. sending or receiving), or social networking sites. The company has a secondary Internet Service Provider (ISP), and that should be used for personal email and social networking via your personal devices, such as cell phones and tablets. Again, you are not permitted to send company information using personal devices or email/social media.
Key Control
Maintaining constant watch over who has access to what electronic and physical key access is imperative. Those users essentially have “the keys to the building,” and at any time that a key should go missing, or is destroyed it is also imperative that each instance is annotated into a log, and immediately replaced as soon as possible. Repeat issues from the same individual should be considered for removal from the privilege of key access.
PDA/Mobile Device