General discussion


What Five Policies Does Every Organization Need?

By Erik Eckel Contributor ·
Organizations have numerous policies. From Internet Use to Streaming Media to Telecommuting and more, clearly written policies make it easy to inform end users what behavior is acceptable in the workplace.

Whether you support restrictive or liberal versions, what five policies do you believe every organization should have in place?

Share your thoughts. In return, I'll publish sample templates on TechProGuild for the top five policies readers mention.

This conversation is currently closed to new comments.

Thread display: Collapse - | Expand +

All Comments

Collapse -

Good question

by Hector_MIS In reply to What Five Policies Does E ...

I'll go for Storage, Email Use, Hardware/Software assignment and fair use.

Those are the ones that come to my mind, but of course there are plenty more.

Collapse -

5 Must have policies

by glabrinakos In reply to Good question

1) Internet Use - Streaming Video/Audio
2) Downloads of hotbar, desktop search engines, smiley's, games (all potential spywhere software)
3) File sharing
4) Network and application passwords
5) Email use

Collapse -

by In reply to What Five Policies Does E ...

1.Computer/Network access policy.
2.E-mail communication.
3.Internet Access.
4.Removable media control.
5.Computer device/asset management.

Collapse -

What Five Policies Does Every Organization Need?

by mjbuono In reply to

Security Policy
Email Policy
Auditing Policy
Internet Policy
Asset management Policy

Collapse -

Fantasy Football

by ITInstructor In reply to What Five Policies Does E ...

I am not sure where this would fit but I have a client who has real problem with this. He is certain he is losing a lot of productivity to this.

Collapse -

RE: Fantasy Football

by Erik Eckel Contributor In reply to Fantasy Football

I think fantasy sports (football, in particular) are significant timewasters. For myself, I've made it a personal policy to only tweak my roster after hours (it's true - check the server logs!). But I read somewhere it's a major cause of productivity loss for many companies.

Thanks for the reminder. I'll draft up a fantasy leagues policy. Look for it on TechProGuild within a few weeks.


Collapse -

Managing and Securing Assets of the Company

by taipan In reply to What Five Policies Does E ...

The 5 *policies* I believe are the foundation to building a solid IT capability for the business includes:

1) Information Management - information is an asset of the company and needs to be given its proper place as a policy (simply put ? make people know you recognize information is probably the most important asset of the company)

2) Information Security - What security means to "us" and high-level how we protect it (you are not allowed to send our customer list to a competitor and no they can have access to our systems)

3) Systems Development and Maintenance - Why and framework for buying/building systems and our expected level of quality (again on the asset front, what be buy/build are assets of the company and we need to manage them as such, including their quality).

4) Use of company-owned technology resources (assets and services) - this would include email/internet use as well as devices such as PDAs, laptops (no kids please), and telephone for example.

5) Use of employee-owned technology - this would take a position that the use of personal hardware/software is prohibited (hey, your cookbook software is crashing the network).

I highlight the term policies as they must be very succinct - down to the point - no fluffiness. Also, not to confuse policies (the what we believe) with procedures (the how we carry it out).

Collapse -

Good Post

by 2support In reply to Managing and Securing Ass ...

I like this. Straight, to the point - little chance of "misunderstanding"

Collapse -

Policy Must Haves

by jsamuelson In reply to What Five Policies Does E ...

In no particular order of importance:

Internet policy: governing which sites are or are not acceptable according to company guidelines. Non work-related internet surfing time is limited to lunch, breaks and 30 minutes a day beyond that... and yes it is actively monitored. :)

Instant messaging policy -- not allowed at all

E-mail policy: business e-mail only; personal e-mail is forbidden at work due to the security risk and the threat posed by outside attachments.

Software policy: who installs what and when. Our desktops are locked down for the most part, but occasionally we open local priveleges for people whose job function or software requires it.

Hardware policy: if work buys it for you, it is supported fully; that cool Christmas tech gadget is not supported and positively not allowed on the network, period.

Collapse -

Five Necessary Policies

by UW-L TSS In reply to What Five Policies Does E ...

These are in no particular order:
Responsible Use
Tape BackUp Retention
Computing Hardware Standardization

Related Discussions

Related Forums