Re: IT Security Policy & Procedures Manual

Subject: Re: IT Security Policy & Procedures Manual
From: "Dick Margulis" <margulis -at- mail -dot- fiam -dot- net>
To: "TECHWR-L" <techwr-l -at- lists -dot- raycomm -dot- com>
Date: Fri, 16 Feb 2001 13:40:33 -0500


My contribution was intended as a value-neutral partial checklist of items that I've seen included in network security policies. It is up to the individual company to decide how permissive or strict they need to be with regard to any of those points and to set forth in the policy exactly what conditions pertain.

Your opinions on which way to go on various policies might or might not coincide with those of a given company's responsible managers.


Sandy Harris wrote:

>This should include some mechanism for getting approval of pieces of software you
>need. The list cannot be static, defined in the policy. There must be a mechanism
>for adding to it.
>> [rest snipped for space]

Develop HTML-Based Help with Macromedia Dreamweaver 4 ($100 STC Discount)
**WEST COAST LOCATIONS** San Jose (Mar 1-2), San Francisco (Apr 16-17) or 800-646-9989.

Sponsored by ForeFront, Inc., maker of ForeHelp Help authoring tools
for print, WinHelp, HTML Help, JavaHelp, and cross-platform InterHelp
See for more information and free evaluation downloads

You are currently subscribed to techwr-l as: archive -at- raycomm -dot- com
To unsubscribe send a blank email to leave-techwr-l-obscured -at- lists -dot- raycomm -dot- com
Send administrative questions to ejray -at- raycomm -dot- com -dot- Visit for more resources and info.

Previous by Author: Re: IT Security Policy & Procedures Manual
Next by Author: Controlling basic text in an e-mail newsletter
Previous by Thread: Re: IT Security Policy & Procedures Manual
Next by Thread: Re: IT Security Policy & Procedures Manual

What this post helpful? Share it with friends and colleagues:

Sponsored Ads