Tip

Sample security policy for end users, part seven



Here is the seventh part of a sample security policy for end users, submitted by searchSecurity member Nap van Zuuren. Give it a read and tell us what you think by rating it at the bottom of the page. And, don't miss the rest of the policy; follow the link below.

XVI. Appendix C

Acknowledgment of Receipt for Laptop (Portable Computer)

This form is used to acknowledge receipt of Laptop (Portable Computer).

Procedure
Complete the following steps:
1. Read the Software/Hardware Policy.
2. Sign and date this form in the spaces provided below.
3. Return this page only to the assigned Network Administrator (1).
- The return of this page can also be carried out by e-mail after PGP-signing of this page.

Model: x
S/N: x

You are personally responsible for protecting the laptop (portable computer) entrusted to you. For your own protection, and that of the system, always take the following precautions:
- Exercise care not to lose your laptop.
- Never leave your laptop unguarded.
- If leaving your work on your laptop, (as a minimum) log off as User. - Do not let anyone access the system under your identity (that is, log in with your Use ID and Password).

I hereby acknowledge receipt of the above mentioned laptop and its associated accessories, and I acknowledge receipt of the instructions and agree to abide by the rules for use.

Signature:

    Requires Free Membership to View

x
Printed Name: x
Date: x
Company: x


This sample policy is continued in Part Eight.


This was first published in December 2001

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.