Latest from Scott Matteson
-
Bring your own device (BYOD) policy
The Bring Your Own Device (BYOD) movement has helped business save money on technological spending by allowing employees to use their own mobile devices, tablets or other electronics to conduct compan...
-
Security Response Policy
Good cyber and physical security can make or break companies. While of course it would be preferable that security breaches or incidents not take place at all, they don’t necessarily signal the death ...
-
Third party vendor policy
In today’s era many businesses rely on outside companies, known as third party organizations, to handle their data or services. Some examples might include vendors, marketing firms, recruiting organiz...
-
Development lifecycle policy
Software development is a complex process which involves a specific series of steps (known as the development lifecycle) to transform a concept into a deliverable product. The steps involved with crea...
-
Asset control policy
Appropriate asset controls are important in order to safeguard the business while providing employees the use of assets needed to do their jobs. These controls ensure assets are managed and tracked in...
-
Moonlighting policy
Moonlighting, the practice of working for another organization in a separate job in addition to one’s current employment, is a fairly common practice these days. It’s especially frequent in technology...
-
Artificial intelligence ethics policy
The purpose of this policy is to provide guidelines for the appropriate use of ethics involving artificial Intelligence. This policy can be customized as needed to fit the needs of your organization....
-
Mobile device security policy
More and more users are conducting business on mobile devices. This can be due to increases in remote workers, travel, global workforces, or just being on-the-go. This policy provides guidelines for m...
-
Privacy policy
Ensuring the privacy of data is essential for every organization in order to safeguard employees and customers by placing confidential information only within authorized hands or upon authorized syste...