Sie sind auf Seite 1von 4

** FREE PREVIEW VERSION **

[organization logo] Commented [EUGDPR1]: All fields in this document marked


by square brackets [ ] must be filled in.
[organization name]

Commented [EUGDPR2]: To learn more about the structure


IT SECURITY POLICY of this document, read this article:

How to structure the documents for ISO 27001 Annex A controls


http://advisera.com/27001academy/blog/2014/11/03/how-to-
structure-the-documents-for-iso-27001-annex-a-controls/
Code:
Commented [EUGDPR3]: The document coding system should
be in line with the organization's existing system for document
Version: coding; in case such a system is not in place, this line may be
deleted.

Date of version:

Created by:

Approved by:

Confidentiality level:

©2017 This template may be used by clients of Advisera Expert Solutions Ltd. in accordance with the License Agreement.
[organization name] [confidentiality level]

Change history
Date Version Created by Description of change

dd.mm.yyyy 0.1 EUGDPRAcademy Basic document outline

Table of contents
1. PURPOSE, SCOPE AND USERS ..............................................................................................................3

2. REFERENCE DOCUMENTS ....................................................................................................................3

3. BASIC SECURITY RULES........................................................................................................................3

3.1. DEFINITIONS .............................................................................................................................................. 3


3.2. ACCEPTABLE USE ........................................................................................................................................ 3
3.3. RESPONSIBILITY FOR ASSETS .......................................................................................................................... 3
3.4. PROHIBITED ACTIVITIES ................................................................................................................................ 3
3.5. TAKING ASSETS OFF-SITE ................................................................................. ERROR! BOOKMARK NOT DEFINED.
3.6. RETURN OF ASSETS UPON TERMINATION OF CONTRACT ......................................... ERROR! BOOKMARK NOT DEFINED.
3.7. BACKUP PROCEDURE ...................................................................................... ERROR! BOOKMARK NOT DEFINED.
3.8. ANTIVIRUS PROTECTION .................................................................................. ERROR! BOOKMARK NOT DEFINED.
3.9. AUTHORIZATIONS FOR INFORMATION SYSTEM USE................................................ ERROR! BOOKMARK NOT DEFINED.
3.10. USER ACCOUNT RESPONSIBILITIES ..................................................................... ERROR! BOOKMARK NOT DEFINED.
3.11. PASSWORD RESPONSIBILITIES ........................................................................... ERROR! BOOKMARK NOT DEFINED.
3.12. INTERNET USE ............................................................................................... ERROR! BOOKMARK NOT DEFINED.
3.13. E-MAIL AND OTHER MESSAGE EXCHANGE METHODS .............................................. ERROR! BOOKMARK NOT DEFINED.
3.14. COPYRIGHT .................................................................................................. ERROR! BOOKMARK NOT DEFINED.

4. MANAGING RECORDS KEPT ON THE BASIS OF THIS DOCUMENT .........ERROR! BOOKMARK NOT DEFINED.

5. VALIDITY AND DOCUMENT MANAGEMENT........................................ERROR! BOOKMARK NOT DEFINED.

IT Security Policy ver [version] from [date] Page 2 of 4

©2017 This template may be used by clients of Advisera Expert Solutions Ltd. in accordance with the License Agreement.
[organization name] [confidentiality level]

1. Purpose, scope and users


The purpose of this document is to define clear rules for the use of the information system and other
information assets in [organization name].

Users of this document are all employees of [organization name].

2. Reference documents
 ISO/IEC 27001 standard
 [Information Classification Policy]
 [Security Procedures for the IT Department]

3. Basic Security Rules


3.1. Definitions

Information system – includes all servers and clients, network infrastructure, system and application
software, data, and other computer subsystems and components which are owned or used by the
organization or which are under the organization's responsibility. The use of an information system
also includes the use of all internal or external services, such as Internet access, e-mail, etc.

Information assets – in the context of this Policy, the term information assets is applied to
information systems and other information/equipment including paper documents, mobile phones,
portable computers, data storage media, etc.

3.2. Acceptable use

Information assets may be used only for business needs with the purpose of executing organization-
related tasks.

3.3. Responsibility for assets

Each information asset has an owner designated in the Inventory of Assets. The asset owner is
responsible for the confidentiality, integrity and availability of information in the asset in question.

3.4. Prohibited activities

It is prohibited to use information assets in a manner that unnecessarily takes up capacity, weakens
the performance of the information system or poses a security threat. It is also prohibited:

 to download image or video files which do not have a business purpose, send e-mail chain
letters, play games, etc.
 to install software on a local computer without explicit permission by [job title]
 to use Java applications, Active X controls and other mobile code, except when authorized by
[job title]

IT Security Policy ver [version] from [date] Page 3 of 4

©2017 This template may be used by clients of Advisera Expert Solutions Ltd. in accordance with the License Agreement.
[organization name] [confidentiality level]

 to use cryptographic tools (encryption) on a local computer, except in the cases specified in
the Information Classification Policy Commented [EUGDPR4]: To be deleted if such a Policy does
 to download program code from external media not exist.

 to install or use peripheral devices such as modems, memory cards or other devices for
storing and reading data (e.g. USB flash drives) without explicit permission by [job title]; use
in accordance with the Information Classification Policy is allowed

** END OF FREE PREVIEW **

To download full version of this document click here:


https://advisera.com/eugdpracademy/documentation/it-security-policy/

IT Security Policy ver [version] from [date] Page 4 of 4

©2017 This template may be used by clients of Advisera Expert Solutions Ltd. in accordance with the License Agreement.

Das könnte Ihnen auch gefallen