The following sample outlines a set of policies and procedures governing the acceptable use of technology resources.
This policy states that computer resources be utilized in a manner consistent with the company ethics statement. Information security services (ISS) is committed to protecting company technology resources from illegal or damaging actions by individuals. This policy applies to anyone with authorized access to company technology resources, including permanent and temporary employees or third party personnel such as temporaries, contractors, consultants, and other parties with valid access accounts. It also applies to equipment that is owned or leased by the company.