End user cyber security policies
These are internal cyber security policies, intended to control the use of IT systems by employees of a company and company sub-contractors. See also our supply chain cyber security policies, through which contractual obligations relating to information security can be applied to suppliers. These policies were created and are maintained by Emma Osborn of OCSRC.
Free cyber security policy
Get | |
Version | 1.0 |
---|---|
First published | 28 Aug 2018 |
Last updated | 28 Aug 2018 |
Word count | 1,558 |
Template pages | 2 |
End user cyber security policy (basic)
Buy | |
Version | 1.0 |
---|---|
First published | 28 Aug 2018 |
Last updated | 19 Jan 2023 |
Word count | 1,451 |
Template pages | 2 |
End user cyber security policy (standard)
Buy | |
Version | 1.0 |
---|---|
First published | 6 Aug 2018 |
Last updated | 19 Jan 2023 |
Word count | 2,692 |
Template pages | 3 |
End user cyber security policy (premium)
Buy | |
Version | 1.0 |
---|---|
First published | 6 Aug 2018 |
Last updated | 19 Jan 2023 |
Word count | 3,689 |
Template pages | 4 |
Compare contents
Free cyber security policy contents
- Introduction: employee and contractor contribution to security; the need for employees/contractors to be vigilant; providing information on how to keep the companysecure; contact for queries ; the policy is part of the contract.
- Credit: docular credit; free documents licensing warning.
- Cyber security requirements: rules about passwords; circumventing security measures; reporting of security breaches; no accessing work systems with personal devices; installing software onto companycomputer or phone; accessing inappropriate content.
- Consequences of system misuse: actions considered to be misuse of IT systems; consequences of IT system misuse.
- Declaration: agreement to abide by policy; signature; signature line: first.
End user cyber security policy (basic) contents
- Introduction: employee and contractor contribution to security; the need for employees/contractors to be vigilant; providing information on how to keep the companysecure; contact for queries ; the policy is part of the contract.
- Cyber security requirements: rules about passwords; circumventing security measures; reporting of security breaches; no accessing work systems with personal devices; installing software onto companycomputer or phone; accessing inappropriate content.
- Consequences of system misuse: actions considered to be misuse of IT systems; consequences of IT system misuse.
- Declaration: agreement to abide by policy; signature; signature line: first.