End-User Information Security Background Policy
Subscriber Content
Guidelines and Procedures for Company IT Systems
This policy sample establishes guidelines and procedures common to use of company information technology systems.
Sample procedures include: without specific written exceptions, all programs and documentation generated by, or provided by employees, contractors, consultants, temporaries and third parties for the benefit of the company are the property of the company; the company owns all information technology assets and the data stored within those assets; the company may access, at its sole option, the assets and the data at any time; and all users must review information security end-user policies and procedures.