To develop effective information security guidelines, you must cover a number of issues, from acceptable Internet and e-mail usage to access codes to software licensing issues. We've updated this member-submitted policy for you to use as a framework for developing guidelines to protect your own organization.
Use this policy as-is or customize it to meet your needs.
- Other Download
- 102 KB
- Aug 2008
- Tech Pro Research
Not a Tech Pro Research member?
Sign up for a Free Trial and get access
to Tech Pro Research for one week.