Security Policies 2

Various Security Policies listed on one side and details of what they could include on the other side.

HideShow resource information
  • Created by: Callum
  • Created on: 17-05-13 10:22
Legal Compliance
Follow the Law, DPA, Computer Misuse Act, Copyright
1 of 9
Non-Institutional Use
Only work produced for the organisation can be performed using the using the organisations ICT facilities
2 of 9
Usernames & Passwords
Passwords must be confidential, Must not be shared, Logging off
3 of 9
Use/Behaviour
Must not damage ICT facilities, Must not modify software, Minimise use of consumables, Forbid use of food & drink in room, Interfering with others ICT use, No downloading of or distribution of offensive material, Not deliberately introduced viruses
4 of 9
Equipment
No movement without permission, No attachment to network without permission
5 of 9
Health & Safety
Compliance with health and safety laws, Adopt safe working practices
6 of 9
Penalties for Infringement
Legal Penalties, Disciplinary Action
7 of 9
Methods of Informing employees about Policies
Lecture as part of induction, Staff meetings, Internal Courses, Leaflets, Posters, Emails and Organisations Intranet
8 of 9
Methods of Informing employees about Policies
Lecture as part of induction, Staff meetings, Internal Courses, Leaflets, Posters, Emails and Organisations Intranet
9 of 9

Other cards in this set

Card 2

Front

Only work produced for the organisation can be performed using the using the organisations ICT facilities

Back

Non-Institutional Use

Card 3

Front

Passwords must be confidential, Must not be shared, Logging off

Back

Preview of the back of card 3

Card 4

Front

Must not damage ICT facilities, Must not modify software, Minimise use of consumables, Forbid use of food & drink in room, Interfering with others ICT use, No downloading of or distribution of offensive material, Not deliberately introduced viruses

Back

Preview of the back of card 4

Card 5

Front

No movement without permission, No attachment to network without permission

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »