Social Media Usage Policy
Description The Appropriate Use of Social Media Policy provides language and procedures for how company employees should access and use social media web sites at
Description The Appropriate Use of Social Media Policy provides language and procedures for how company employees should access and use social media web sites at
Description The Remote System Access Policy establishes rules and procedures for any employee, vendor or partner who is given remote access to the corporate computer
Description The rules in this policy apply to physical access to any corporate facilities, but you own access to the computer rooms along with facilities
Description This policy is written for the benefit of end users who bristle at the thought of setting a password on more than a once-only
Description This policy’s 19 rules inform the world, among other things, that “only authorized users are allowed on the company network.” For end users, it
Description The malware security policy documents your organization’s commitment to addressing head-on the problem of Internet- and email-based viruses. This policy also informs end users
Description This policy lays down the law of the land regarding how workers on the corporate network use the Internet. It should come to no
Description The Email Security Policy provides specific rules, procedures and guidance for how employees are to use the company’s email account. The document is available
Description This data retention policy is a boiler plate template that defines the scope, policy and compliance terms for corporate computer users who create, edit
Description The Corporate Twitter Account Policy defines the rules for how employees should and should not use the company’s Twitter account. Download the entire policy in Microsoft Word