A Guide for Drafting Comprehensive and Effective Computer Policies

V3- Updated to deal with today's computer environment

 

General Info
Table of Contents
Response Guide
License Agreement
About the Author
Satisfaction Guarantee
Legal Edition

COMPUTER  USE POLICY
INTERNET USE POLICY
INFORMATION USE POLICY
ACCEPTABLE USE POLICY
EMAIL POLICY

 

A Guide for Drafting Comprehensive and Effective Computer Policies

V3- Updated to deal with today's computer environment

REHMAN TECHNOLOGY SERVICES, INC.

Available for immediate download!
$195

Often overlooked, detailed policies on the use of computers within an organization are an ever increasing necessity. Corporations and government agencies are racing to provide Internet access to their employees. With this access, a Pandora's box of problems is opened. Paramount is loss of productivity; workers can easily spend countless hours online daily entertaining and amusing themselves at their employer’s expense. A hostile work place environment can be created through pornography, potentially exposing the organization to civil liability.

Don't waste countless hours searching the Internet for sample policies. Our guide will assist you in quickly creating thorough policies! 

Click Here for Ordering Information

General Guide Info
Table of Contents
Std Ed License Agreement
Satisfaction Guarantee
About the Author

Not just a collection of policies- Thorough explanations of why you need each part of each policy 

While protecting your organization from outside threats is clearly important, protecting the organization from internal threats is at least as important, if not more so. According to a Computer Crime and Security Survey conducted by the Computer Security Institute and the FBI, 55% of the respondents reported unauthorized access to information by persons inside the organization, compared to just 30% who reported intrusions by outsiders. A quarter reported theft of proprietary information and 69% reported theft of laptop computers. Ninety percent (90%) reported virus contamination and a staggering 97% reported systems abuse by insiders (pornography, pirated software, inappropriate email usage, etc.). According to Sextracker, an organization that tracks the online pornography trade, seventy percent (70%) of online pornography viewing occurs during the 9-5 workday.

In use by countless organizations (banks, insurance companies, law firms, local governments, retailers, technology firms, educational institutions, charitable organizations, manufacturers, distributors, etc.)

To See a List of Some Users, Click Here

Some of the topics covered in the guide include: 

bullet Physical Security
bullet Electronic Security
bullet Personal Use of the Internet/Online Services
bullet Personal Use of the Computer for Word Processing, etc.
bullet Loading of Non-Organization Software
bullet Downloading from the Internet/Online Services
bullet Pornography
bullet Information Usage
bullet Levels of Access
bullet Allowable Uses of Access
bullet Ownership of Software, Data, etc.
bullet Data and Information Security
bullet Trade Secrets
bullet Confidentiality of Organizations Records
bullet Logon Banners
bullet Use of Email
bullet Organization's Right to Inspect Computers
bullet Organization's Right to Access Email
bullet Document Retention Schedules
bullet Voicemail
bullet Telecommuting

Our policy guide will pay for itself many times over in the time that you will save trying to research all of the topics.

Our manual has been updated to address all manner of computer related policy needs. The content is based on years of experience in employment related investigations, computer crime investigations, civil litigation, and criminal prosecutions. (RTSI specializes in employment related high tech investigations, including computer forensics.) 

Approximately half of the manual is detailed discussions on each of the 11 policy topic areas; the other half is sample policies that can be readily customized for your organization. The discussions include topics such as why policies are needed, potential liability, employee productivity considerations, and civil litigation. Safeguarding critical and confidential information is discussed in detail. The policies directly address the problems that we typically find in organizations of all sizes.

All of the sample policies are contained in a Rich Text Format (RTF) file allowing virtually any word processor to cut and paste the sample policies from it for editing. This comprehensive guide covers all aspects of computer, Internet, and information policies and the rationale for the sample policies is thoroughly explained to aid in policy formulation.

The Table of Contents, the General Information section, and the Response Guide section of the manual are available online to assist you in evaluating it. Additionally, theLicense Agreement and a brief profile of the Author are also available.

Read about us in the Orlando Business Journal!

The sample policies are licensed to your organization for its internal use and may modified and copied as necessary. The manual is licensed to your organization for its internal use and may not be duplicated. Neither may be transferred outside of your organization. Please see the License Agreement for full details.

We have a separate licensing agreement available for law firms or consulting firms that plan to utilize the guide for creating policies for their clients. Pleaseclick here for details.

In use throughout North America, Europe, Asia, Africa, and Australia.

No organization should be without computer, Internet, and information policies. Our guide will save you countless hours of research and covers many areas that might otherwise be overlooked.  

horizontal rule

A Guide for Drafting Comprehensive and Effective Computer Policies

CLICK HERE TO ORDER NOW!

Satisfaction Guarantee

horizontal rule

 

[General Info] [Table of Contents] [Response Guide] [License Agreement] [About the Author] [Satisfaction Guarantee] [Legal Edition]

(352)357-0500
(c) 1998-2013 Copyright Rehman Technology Services, Inc.