ipl-logo

How Do You Have A Technology And Internet Usage Policy In Your Employee Handbook

772 Words4 Pages

Do you have a technology and internet usage policy in your employee handbook?
Have you thought about it, but aren’t sure what to add in there and why? Over the last three decades we’ve helped hundreds of companies’ technology usage and internet security protocols for their businesses. Below are some policies that you should consider.
Stress the Importance of Cybersecurity
In your company internet policies, you will really have to convey why cyber security is important and you can even list some of the potential risks. If information is stolen or the company’s systems are infected with malware, explain how this could affect the business.
Include a Password Management Policy
Set guidelines on password requirements, like using a combination of …show more content…

Software and applications installed on a company computer should only be done with authorization of management and your IT provider. Problems with Shadow IT can include viruses hidden in their zip-files. Shadow IT could also be incompatible with a business application causing it to malfunction. Further, installing programs which your company doesn’t own onto company computers can create liability if license violations occur.
E-Mail Policy
Make sure that your employees know that their company email should only be used for business purposes. Personal communication needs to be either limited or completely prohibited. If you have a record retention schedule, make sure that your employees know what it is. You also have to make sure that they are abiding by the schedule when it comes to the retention of business emails.
Employees should only be using a Secure File System
If your employees send files outside of your organization to vendors or customers, it is important that they understand that sensitive information cannot simply be sent through an email. Confidential data, like social security numbers or credit card information should always be encrypted. They need to always send encrypted files through a secure file

More about How Do You Have A Technology And Internet Usage Policy In Your Employee Handbook

Open Document