Implement an Updated Acceptable Use Policy
One very important aspect of security is how technology resources such as the company network, computers, or project management and other collaboration tools are used. This policy lays out key points that cover the secure use of these technology tools and resources.
Even if you already have this policy at your organization, we’ll provide you with a more comprehensive document tailored to the services you use and the resources you now have given previously completed modules. This ties in all of the work we’ve done so far, and sets company expectations.
Here’s what we’ll do in this module
- Generate a customized Acceptable Use Policy
- Assign a “Policy Magistrate” – who will be listed in your policy manager as the person anyone with questions should reach out to.
- Ensure the modules that provide the capabilities this policy requires have been completed, or that the tooling required otherwise exists.
- Distribute the policy electronically to your team and track their individual acknowledgement of the policy into a downloadable audit record.