Sample security policy for end users, part eight

This is the final part of a sample security policy for end users that you can customize to fit your needs.



This is the final part of a sample security policy for end users, submitted by searchSecurity member Nap van Zuuren. Give it a read and tell us what you think by rating it at the bottom of the page.

Notes on this specific draft

Please note the following in relation to this specific draft.

1) In the company :
  • The EndUsers are all working on Windows2000 / Office2000-based computer equipment.
  • In relation to virus protection, the company's End User equipment is using Norton Antivirus Corporate Edition
  • For their VPN-connections, the company is using SecuRemote in combination with RSA SecureID (Tokens).
  • In relation to "Microsoft Office Update," the company has chosen not to have the MS-Office2000 CD "on line"; thereby the remark(s) on the need of getting hold of the CD used for the initial installation of Office 2000 (Pro) on the specific piece of equipment to enable installation of the Service Packs and/or Releases.
  • All fields in italics have to be edited in relation to company name and structure.
  • The destination/'routing' of Appendices A, B and C might have to be adapted to your organization, e.g.; => H.R. Dept.

    This "sample" policy is based on input from -- among others --:

    IT PROFESSIONAL'S GUIDE TO POLICIES AND PROCEDURES from Tech Republic (www.techrepublic.com)
    - Sample Policy

    OUT OF IT PROFESSIONAL'S GUIDE TO POLICIES AND PROCEDURES from Tech Republic (www.techrepublic.com)
    - Sample Policy

    RE: VIII.b. Hardware standards
    The following list shows the standard hardware configuration for company computers (excluding test computers) that are fully supported by the assigned staff:
    1) Desktop equipment (overstated, to my opinion)
    2) Laptops

    RE 1) and 1a), out of IT PROFESSIONAL'S GUIDE TO POLICIES AND PROCEDURES from Tech Republic's Sample Policy:
    The following list shows the standard hardware configuration for company computers (excluding test computers) that are fully supported by the assigned staff:

    Desktops
    - Desktops will be provided to employees who work primarily from the office.
    - 750-MHz Intel Pentium III Processor
    - 128-MB SDRAM
    - AGP video card with 8 MB RAM
    - 1.44M 3 1/2" floppy drive (A:)
    - 10-GB IDE hard drive single Fat32 partition (C:)
    - 40x or faster speed CD-ROM drive (E:)
    - 10/100 PCI Ethernet card
    - 2 USB ports
    - Sound card
    - Speakers
    - Standard 102-key English keyboard
    - Wheel mouse
    - All applicable cables
    - Surge suppressor

    Laptops
    - Laptops will only be provided to employees required to frequently work away from the office.
    - 450-MHz Intel Pentium III Processor
    - 128-MB SDRAM
    - Video card with 8 MB RAM
    - 1.44M 3 1/2" floppy drive (A:)
    - 6-GB IDE hard drive single Fat32 partition (C:)
    - 40x or faster speed CD-ROM Drive (E:)
    - 10/100 PCI Ethernet card
    - 56K V.90 modem
    - 1 USB port
    - Sound card
    - Docking station
    - Speakers
    - Standard 102-key English keyboard
    - Wheel mouse
    - All applicable cables
    - Surge suppressor

    Monitors
    - Monitors will be provided for both desktop and laptop systems.
    - 17-inch or 19-inch monitor, depending on job requirements

    Printers
    - Employees will be given access to appropriate network laser printers.
    - In some limited cases, employees may be given local printers if deemed necessary by the assigned staff.
    RE 2): Laptops - example:
    Model: Dell Latitude C600
    Processor: PIII 750
    Keyboard: (user preference)
    Memory: 256MB
    HD: 10GB
    OS: W2K (UK)
    NIC: internal NIC + modem
    Carrying case
    External Power supply
    Mouse



  • This was first published in December 2001

    Dig deeper on Security Resources

    Pro+

    Features

    Enjoy the benefits of Pro+ membership, learn more and join.

    0 comments

    Oldest 

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close