74 KB | 3 files | PDF, DOC
This sample policy will help you set standards within your organization to help users and the enterprise avoid consequences of misusing power of e-mail. This policy actually spells out sanctions that can be applied for e-mail abuse.
E-mail has proven to be an extremely valuable tool in solving communication problems. But, it can also create a few problems of its own if standards for appropriate use within an organization aren't created, put in place and enforced.
This document, provided by Indiana University, outlines the on- and off-campus university policy regarding use of electronic mail and includes the following:
This policy applies to all users of Indiana University information technology resources, regardless of affiliation.
The attached Zip file includes:
Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification.... More >>
Determine if data encryption is a fit for the company's critical information.... More >>
Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques.... More >>