Creating policies – it strategy and policy – no plagiarism
Policies should always state required actions and cover mandatory compliance and disciplinary action as well as desired results. Please create the following policies:
- Acceptable Use
- Access Control
- Mobile Device Usage
- Change Management
- Information Security
- Remote Access
- Data Management
- Disaster Recovery
The template should be:
This document establishes a policy for . . .
This document was developed because . . .
This policy applies to the use of . . .
4.1. Section 1
4.2. Section 2
4.3. Section 3
4.4. Section 4
5.ROLES AND RESPONSIBILITIES
The following entities have responsibilities related to the implementation of this policy:
This policy becomes effective on the date that [xxx], Chief Information Officer (CIO), signs it and remains in effect until officially superseded or canceled by the CIO.
8.INFORMATION AND ASSISTANCE
Contact the . . . for further information regarding this policy.
[Director of Information Security Policies] Date of Issuance
This policy is augmented by . . .