Physical Access Policy
Description The rules in this policy apply to physical access to any corporate facilities, but you own access to the computer rooms along with facilities
Description The rules in this policy apply to physical access to any corporate facilities, but you own access to the computer rooms along with facilities
Description This policy is written for the benefit of end users who bristle at the thought of setting a password on more than a once-only
Description This policy’s 19 rules inform the world, among other things, that “only authorized users are allowed on the company network.” For end users, it
Description The malware security policy documents your organization’s commitment to addressing head-on the problem of Internet- and email-based viruses. This policy also informs end users
Description This policy lays down the law of the land regarding how workers on the corporate network use the Internet. It should come to no
Description The Email Security Policy provides specific rules, procedures and guidance for how employees are to use the company’s email account. The document is available
Description This data retention policy is a boiler plate template that defines the scope, policy and compliance terms for corporate computer users who create, edit
Description The Corporate Twitter Account Policy defines the rules for how employees should and should not use the company’s Twitter account. Download the entire policy in Microsoft Word
Description When you publish and publicize an IT computer equipment policy, you put your company’s employees on notice that computer equipment is company property. Many
Description The Company Facebook Page Policy sets the rules for the usage of the corporate Facebook account. It covers what information should not be shared.