If you're looking for the complete 'policy' book, check out TechRepublic's detailed IT Professional's Guide to Policies and Procedures, Third Edition. Not only do you get the critical e-mail and Internet usage policies, but new tools for fighting virus prevention and protecting users' privacy.
Threats to network and desktop security are continually increasing—just this past week computer security experts warned of another new Internet threat that's stealing passwords and account information from online banking sites. It was the second such announcement in a week.
Then, there are ever-growing data-security threats tied to e-mail use. Viruses, spam, and other harmful or unwanted content all represent a serious risk to companies—it's estimated that PC-based viruses cost businesses about $55 billion last year alone.
A key element to thwarting future attacks and virus impacts is end-user security education and strong security policies.
To help IT managers get a strong foothold on both vital tasks, TechRepublic offers detailed comprehensive security policies (priced at $14.95 each) that organizations can easily customize, or use as-is. The downloadable policies not only help inform users about how to avoid e-mail viruses and dangerous downloading, but also establish clear insight on what can and can't be done by users.
Here's a quick look at what each policy provides:
This ready-to-use customizable policy covers a broad range of topics as it relates to E-mail usage like authorized usage, privacy rights, and message monitoring to name a few. You choose to edit, leave as-is, or delete the topic section based on your organization's needs.
This policy outlines the IM carrier supported by the technology department and the appropriate end user behavior. IM etiquette and IM security are also covered in detail. This policy includes an "Acknowledgement of the IM policy" for the end user to sign and date. As with all of our policies, they are designed to be customizable so you can easily control the depth of coverage.
The Internet Usage Policy provides two customizable templates, one for moderate Internet use and one for strict Internet usage. The moderate policy allows for occasional and reasonable personal use of the Internet and the strict policy spells out the permitted and prohibited behavior as well as defining violations. You may choose to require employees' acceptance by having them submit their signatures.
More helpful resources
If spyware and adware have become a drain on IT resources, check out TechRepublic's Quick Guide: Spyware Detection and Removal resource collection that examines how these programs can damage your systems, reviews three of the most popular removal programs (Spy Sweeper, Spybot, and PestPatrol), and provides valuable tips and recommendations for maximizing each application's capabilities.