Sample security policy for end users, part seven

This is the seventh part of a sample security policy for end users that you can customize to fit your needs.



Here is the seventh part of a sample security policy for end users, submitted by searchSecurity member Nap van Zuuren. Give it a read and tell us what you think by rating it at the bottom of the page. And, don't miss the rest of the policy; follow the link below.

XVI. Appendix C

Acknowledgment of Receipt for Laptop (Portable Computer)

This form is used to acknowledge receipt of Laptop (Portable Computer).

Procedure
Complete the following steps:
1. Read the Software/Hardware Policy.
2. Sign and date this form in the spaces provided below.
3. Return this page only to the assigned Network Administrator (1).
- The return of this page can also be carried out by e-mail after PGP-signing of this page.

Model: x
S/N: x

You are personally responsible for protecting the laptop (portable computer) entrusted to you. For your own protection, and that of the system, always take the following precautions:
- Exercise care not to lose your laptop.
- Never leave your laptop unguarded.
- If leaving your work on your laptop, (as a minimum) log off as User. - Do not let anyone access the system under your identity (that is, log in with your Use ID and Password).

I hereby acknowledge receipt of the above mentioned laptop and its associated accessories, and I acknowledge receipt of the instructions and agree to abide by the rules for use.

Signature: x
Printed Name: x
Date: x
Company: x


This sample policy is continued in Part Eight.


This was last published in December 2001

Dig Deeper on Security Resources

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close