You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company. There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company. You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company. Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable). 1. Overview 2. Purpose 3. Scope 4. Policy 5. Policy Compliance 6. Related Standards, Policies and Processes 7. Definitions and Terms

Title: Security Policies for Email and Internet Use in a Financial Services Company

1. Overview:
This security policy aims to outline guidelines and restrictions regarding the use of company resources, specifically email and internet access, in order to ensure the protection of sensitive information, maintain productivity, and minimize security risks within the organization. This policy applies to all employees of the company and any third parties granted access to company resources.

2. Purpose:
The purpose of this policy is to establish clear expectations and responsibilities among employees regarding the appropriate use of email and internet resources. By implementing this policy, the company aims to uphold its commitment to data security, privacy, and compliance with legal and regulatory requirements.

3. Scope:
This policy applies to all aspects of email and internet use conducted on company-owned devices, networks, and systems. It includes both internal and external communications, regardless of the location from which these resources are accessed. Any breaches of this policy may result in disciplinary action, up to and including termination of employment.

4. Policy:
a) Email Use:
i. Personal Use: The primary purpose of company email accounts is for business-related communication. Limited personal use is permitted but should be kept to a minimum and should not interfere with work responsibilities.
ii. Confidentiality: Employees should exercise caution when sending or receiving sensitive or confidential information via email. Encryption should be utilized when appropriate.
iii. Prohibited Content: It is strictly prohibited to use company email resources for any illegal activities, including but not limited to spamming, phishing, or transmitting malicious software.
iv. Monitoring: The company reserves the right to monitor and access employee email accounts, with prior notice, for legitimate business purposes. However, privacy will be respected to the extent permitted by applicable laws.

b) WIFI and Internet Use:
i. Acceptable Use: Employees are granted access to the company’s WIFI and internet resources to fulfill job-related duties. All usage must adhere to the company’s ethical standards, applicable laws, and any additional policies.
ii. Security Measures: Employees should take necessary measures to protect the company’s information assets when accessing the internet, such as using strong passwords, avoiding suspicious websites, and keeping software and antivirus programs up to date.
iii. Prohibited Activities: Unauthorized access to sensitive data, downloading or distributing copyrighted materials without permission, and engaging in any activities that may compromise network security are strictly prohibited.
iv. Employee Responsibility: Employees are personally responsible for their internet usage, and any violations of this policy may result in disciplinary action.

5. Policy Compliance:
Failure to comply with this policy may result in disciplinary action, including written warnings, suspension, termination, or legal consequences, depending on the severity and frequency of the violation. Compliance with this policy is a condition of employment.

6. Related Standards, Policies, and Processes:
This email and internet policy should be read in conjunction with other relevant company policies, including but not limited to the Acceptable Use Policy, Data Security Policy, and Employee Code of Conduct.

7. Definitions and Terms:
Definitions and terms related to email and internet usage are provided in Appendix A of this policy.

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer