Loading...
Computers and technology — programming languages, software, hardware, internet services, security, artificial intelligence, and more. Explore thousands of tech resources organized by a knowledgeable community of editors.
56203 resources
Formal policy from the University of California covering email and other electronic communications mechanisms
Electronic resource usage and security policies from the University of Pennsylvania.
Sample policy on teleworking covering employment as well as information security issues.
Example policy covering pre-employment screening, security policy training etc.
One page Acceptable Use Policy example.
A set of information security policies from the University of Louisville.
A high level information security policy from Washington University.
From the University of North Carolina, Greensboro. Deliberately simple: defines just two classification levels. Includes responsibilities.
From the University of North Carolina, Greensboro. Prohibits wireless devices that may interfere with authorized wireless systems.
From the University of North Carolina, Greensboro. Policy on protecting the organization's own intellectual property through copyright.
From the University of North Carolina, Greensboro. Policy on compliance with the Health Insurance Portability and Accountability Act.
Policy from the University of Colorado on the use of email and other means of electronic communication for official purposes.
SANS consensus research project offering around 30 editable information security policies.
An overarching security policy from Berkeley University includes links to more specific and detailed policies.
One of many many examples on the WWW, this one from the School of Graduate Studies at Norwich University.
High-level information security policy statement for the Childhood Cancer Research Group at Oxford University.
Policy covering appropriate use of information resources and IT at the University of Michigan.
Example security policy to demonstrate policy writing techniques introduced in three earlier articles.
From the New School university in New York. Includes a set of 21 high level principles, cross-referenced to ISO/IEC 27002:2005.
From the University of North Carolina, Greensboro. Covers health and safety and employment issues as well as IT security aspects of home working.
From Herriot-Watt University. Clarifies the respective roles of students, faculty and administrators in reporting and dealing with information security incidents.
Succinct policy from Oregon State University requires that a competent person signs a release form before disposing of storage media from which the data have been securely erased (e.g. by 7x overwrite)
Collection of information security policies, procedures etc. aligned with the ISO/IEC 27000-series standards and provided under the Creative Commons license.
Policy from Northern Illinois University's IT Services group. Outlines some unacceptable uses.
Google's privacy policy is clearly written.