Tip

Sample e-mail policy template and checklist of concerns

A well-written e-mail policy goes beyond proper grammar and spelling. It is clear, concise, easily understood and formatted to support long-term administration. There is a simple template approach you can take when writing e-mail policies to ensure that they meet each of these requirements.

A security policy should be neatly formatted into different sections that facilitate:

  • Ease of use and readability
  • Ongoing updates
  • Flexibility when organizational needs change
This sounds somewhat detailed and complex, but it's actually really simple. The following format is all it takes to support these elements regardless of the size of your organization:

    Requires Free Membership to View

Introduction: A brief overview of the topic, in this case, e-mail.

Purpose: Briefly outline the high-level goal(s) and strategy of the policy.

Scope: State which employees, departments and e-mail systems are covered.

Roles and responsibilities: Outline who's involved and what they must do to support the policy.

Policy statement: State your actual e-mail policy or policies. This will likely consist of several sentences covering varying topics such as attachments, encryption, spam, confidential information and more. You can also create a separate document for each of these policy statements if they turn out to be too long or vary too much across departments.

Exceptions: Highlight people, departments and e-mail systems that are not covered by the e-mail policy.

Procedures: Detail steps on how the policy is being implemented and enforced. It may make the most sense to reference this information and place it in a separate document.

Compliance: Outline procedures for measuring compliance with this policy.

Sanctions: Outline consequences for policy violations. For example, x happens on the first offense, y happens on the second offense and z happens on the third offense.

Review and evaluation: State when the policy must be reviewed for accuracy, applicability and compliance purposes (i.e. SOX, HIPAA, GLBA, etc.).

References: Point to regulatory code sections and information security standards (ISO/IEC 17799, CoBIT, etc.).

Related documents: Point to other policies, guidelines, standards and related documents.

Revisions: Document ongoing changes.

Notes: Highlight notes, tips, etc., that can help with future policy administration.

Click here for a quick e-mail security policy checklist you can run through to help make sure you're on the right track.

About the author
Kevin Beaver is founder and principal consultant of Atlanta-based Principle Logic, LLC where he specializes in information security assessments for those who take security seriously and incident response for those who don't. He is author and co-author of several information security books including the
The Definitive Guide to E-mail Management and Security (Realtimepublishers.com), Hacking For Dummies (Wiley) and the upcoming Hacking Wireless Networks For Dummies. Kevin can be reached at kbeaver@principlelogic.com.

This was first published in March 2005

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.