Sample security policy for end users, part five

Here is the fifth part of a sample security policy for end users, submitted by searchSecurity member Nap van Zuuren. Give it a read and tell us what you think by rating it at the bottom of the page. And, don't miss the rest of the policy; follow the link below.

XIV. Appendix A

Acknowledgment of Software/Hardware Policy

This form is used to acknowledge receipt of and compliance with the company's Software/Hardware Policy.

Complete the following steps:
1. Read the Software/Hardware Policy.
2. Sign and date this form in the spaces provided below.
3. Return this page only to the assigned Network Administrator (1).
- The return of this page can also be carried out by e-mail after PGP-signing of this page.

By signing below, I agree to the following terms:
(i) I have received and read a copy of the Software/Hardware Policy and understand and agree to the same.
(ii) I understand and agree that any software and hardware devices provided to me by the company remain the property of the company.
(iii) I understand and agree that I am not to modify, alter or upgrade any software programs or hardware devices provided to me by the organization without the permission of assigned staff.
(iv) I understand and agree that I shall not copy, duplicate (except for backup purposes as part of my job), or allow

Requires Free Membership to View

anyone else to copy or duplicate any software.
(v) I understand and agree that if I leave the company for any reason, I shall immediately return to the company the original and copies of any and all software, computer materials, or computer equipment that I may have received from the company that is either in my possession or otherwise directly or indirectly under my control.
(vi) I understand and agree I must make reasonable efforts to protect all company-provided software and hardware devices from theft and physical damage.

Employee Signature: x
Employee Name: x
Employee Title: x
Date: x
Department/Location: x

This sample policy is continued in Part Six.

This was first published in December 2001

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.