Problem solve Get help with specific problems with your technologies, process and projects.

Sample security policy for end users, part seven

This is the seventh part of a sample security policy for end users that you can customize to fit your needs.

Here is the seventh part of a sample security policy for end users, submitted by searchSecurity member Nap van Zuuren. Give it a read and tell us what you think by rating it at the bottom of the page. And, don't miss the rest of the policy; follow the link below.

XVI. Appendix C

Acknowledgment of Receipt for Laptop (Portable Computer)

This form is used to acknowledge receipt of Laptop (Portable Computer).

Complete the following steps:
1. Read the Software/Hardware Policy.
2. Sign and date this form in the spaces provided below.
3. Return this page only to the assigned Network Administrator (1).
- The return of this page can also be carried out by e-mail after PGP-signing of this page.

Model: x
S/N: x

You are personally responsible for protecting the laptop (portable computer) entrusted to you. For your own protection, and that of the system, always take the following precautions:
- Exercise care not to lose your laptop.
- Never leave your laptop unguarded.
- If leaving your work on your laptop, (as a minimum) log off as User. - Do not let anyone access the system under your identity (that is, log in with your Use ID and Password).

I hereby acknowledge receipt of the above mentioned laptop and its associated accessories, and I acknowledge receipt of the instructions and agree to abide by the rules for use.

Signature: x
Printed Name: x
Date: x
Company: x

This sample policy is continued in Part Eight.

This was last published in December 2001

Dig Deeper on Information security policies, procedures and guidelines

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.