By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Here's a quick checklist you can run through with your existing or new policy to help make sure you're on
the right track:
|SECURITY POLICIES CHECKLIST|
|How long is your policy document? Two or three pages at most are usually more than enough to cover the issues at hand.|
|Does the roles and responsibilities section contain more than just IT personnel? It should -- policies are a management issue, not just an IT or security issue.|
|Has your policy been customized to your organization's needs based on e-mail usage, known vulnerabilities, etc.?|
|If you hand your policy document to a middle- or even elementary-school student could he or she repeat back to you what it says? Policies should be easy to read and understand.|
|Does your policy state, "this is how we do it here"?|
|Would an average adult say that your policy is reasonable and realistic?|
- Check out this free sample e-mail policy template
- Learn how to write policies that demonstrate compliance
- Get the key security policy elements here
Kevin Beaver is founder and principal consultant of Atlanta-based Principle Logic, LLC where he specializes in information security assessments for those who take security seriously and incident response for those who don't. He is author and co-author of several information security books including the The Definitive Guide to E-mail Management and Security (Realtimepublishers.com), Hacking For Dummies (Wiley), and the upcoming Hacking Wireless Networks For Dummies. Kevin can be reached at kbeaver @ principlelogic.com.