The University of Toronto has a great example of a Network Security Policy here. Here’s an excerpt: Computing & Networking Services will: monitor in real-time, backbone network traffic, as necessary and appropriate, for the detection of unauthorized activity, intrusion attempts and compromised equipment. carry out and review the results of automated network-based vulnerability, compromise assessment […]
Read the full article →
I wrote a generic Personnel Security Policy which is attached below. Sections of this policy include: Requirement to Protect Corporate Assets Information Security Responsibilities in Employee Handbook & Contracts Information Security Training Background Checks Bonding Conflict of Interest Non-Disclosure Agreements Security Incidents Here’s an excerpt: Include information security responsibilities in company rules and worker’s contracts. […]
Read the full article →