Register
Forgotten password?

A family of End user cyber security policiesdocumentsEnd user cyber security policies

These are internal cyber security policies, intended to control the use of IT systems by employees of a company and company sub-contractors. See also our supply chain cyber security policies, through which contractual obligations relating to information security can be applied to suppliers. These policies were created and are maintained by Emma Osborn of OCSRC.

Free cyber security policy

FREE

Get
Version 1.0
First published 28 Aug 2018
Last updated 28 Aug 2018
Word count 1,558
Template pages 2

End user cyber security policy (basic)

FROM

£10.00

OR

10

CREDITS
Buy
Version 1.0
First published 28 Aug 2018
Last updated 28 Aug 2018
Word count 1,460
Template pages 2

End user cyber security policy (standard)

FROM

£20.00

OR

20

CREDITS
Buy
Version 1.0
First published 6 Aug 2018
Last updated 6 Aug 2018
Word count 2,702
Template pages 3

End user cyber security policy (premium)

FROM

£30.00

OR

30

CREDITS
Buy
Version 1.0
First published 6 Aug 2018
Last updated 6 Aug 2018
Word count 3,699
Template pages 4

Compare contents

Free cyber security policy contents

  1. Introduction: employee and contractor contribution to security; the need for employees/contractors to be vigilant; providing information on how to keep
    the company
    secure; contact for queries ; the policy is part of the contract.
  2. Credit: docular credit; free documents licensing warning.
  3. Cyber security requirements: rules about passwords; circumventing security measures; reporting of security breaches; no accessing work systems with personal devices; installing software onto
    company
    computer or phone; accessing inappropriate content.
  4. Consequences of system misuse: actions considered to be misuse of IT systems; consequences of IT system misuse.
  5. Declaration: agreement to abide by 
    policy
    ; signature; signature line: first.

End user cyber security policy (basic) contents

  1. Introduction: employee and contractor contribution to security; the need for employees/contractors to be vigilant; providing information on how to keep
    the company
    secure; contact for queries ; the policy is part of the contract.
  2. Cyber security requirements: rules about passwords; circumventing security measures; reporting of security breaches; no accessing work systems with personal devices; installing software onto
    company
    computer or phone; accessing inappropriate content.
  3. Consequences of system misuse: actions considered to be misuse of IT systems; consequences of IT system misuse.
  4. Declaration: agreement to abide by 
    policy
    ; signature; signature line: first.