Requirements for password-protected screen savers ![]() Rules and approvals needed for nonstandard equipment requests (laptops, over-sized monitors, equipment at home) Resources and rules in place for spam and virus defense (e.g., the blocking of certain attachment types) Limits on the size of e-mail messages and mailboxes Password requirements (length, frequency of changes, etc.) Other examples of policies that can be defined include: ![]() ![]() However, if this policy is documented and posted, it helps ensure that all employees (both IT and users) are aware of it and that it can be applied consistently. For example, there may be an informal policy that has determined when personal printers (as opposed to shared network printers) are permitted.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |