Information Security Policies and Procedures: Corporate Policies-Tier 1, Tier 2 and Tier3 Policies
Information Security Policies and Procedures: Corporate Policies-Tier 1, Tier 2 and Tier3 Policies
Information Security Policies and Procedures: Corporate Policies-Tier 1, Tier 2 and Tier3 Policies
UNIT -3 NOTES
Information security policies and procedures: Corporate policies- Tier 1, Tier 2 and Tier3
policies
Information Security Policy (ISP) is a set of rules enacted by an organization to ensure that all
users or networks of the IT structure within the organization's domain abide by the prescriptions
regarding the security of data stored digitally within the boundaries the organization stretches its
authority.
An information security policy (ISP) is a set of rules, policies and procedures designed to ensure
all users and networks within an organization meet minimum IT security and data protection
security requirements.
ISPs should address all data, programs, systems, facilities, infrastructure, users, third-parties and
fourth-parties of an organization.
ISPs are important for new and established organizations. Increasing digitalization means every
employee is generating data and a portion of that data must be protected from unauthorized
access. Depending on your industry, it may even be protected by laws and regulations.
Sensitive data, personally identifiable information (PII), and intellectual property must be
protected to a higher standard than other data.
Increased outsourcing means third-party vendors have access to data too. This is why third-party
risk management and vendor risk management is part of any good information security
policy. Third-party risk, fourth-party risk and vendor risk are no joke
1. Purpose
Outline the purpose of your information security policy which could be to:
2. Audience
Define who the information security policy applies to and who it does not apply to. You may be
tempted to say that third-party vendors are not included as part of your information security
policy.
An access control policy can help outline the level of authority over data and IT systems for
every level of your organization. It should outline how to handle sensitive data, who is
responsible for security controls, what access control is in place and what security standards are
acceptable.
It may also include a network security policy that outlines who can have access to company
networks and servers, as well as what authentication requirements are needed including strong
password requirements, biometrics, ID cards and access tokens.
In some cases, employees are contractually bound to comply with the information security policy
before being granted access to any information systems and data centers.
5. Data classification
An information security policy must classify data into categories. A good way to classify the data
is into five levels that dictate an increasing need for protection:
Security programs
Acceptable use policies
Network security
Physical security
Business continuity
Access management
Security awareness
Risk assessments
Incident response
Data security
Disaster recovery
Incident management
1. Acceptable use policy (AUP): Outlines the constraints an employee must agree to use a
corporate computer and/or network
2. Access control policy (ACP): Outlines access controls to an organization's data and
information systems
3. Change management policy: Refers to the formal process for making changes to IT,
software development and security
4. Information security policy: High-level policy that covers a large number of security
controls
5. Incident response (IR) policy : An organized approach to how the organization will
manage and remediate an incident
6. Remote access policy: Outlines acceptable methods of remotely connecting to internal
networks
7. Email/communication policy: Outlines how employees can use the business's chosen
electronic communication channel such as email, slack or social media
8. Disaster recovery policy: Outlines the organization's cybersecurity and IT teams input
into an overall business continuity plan
9. Business continuity plan (BCP): Coordinates efforts across the organization and is used
in the event of a disaster to restore the business to a working order
10. Data classification policy: Outlines how your organization classifies its data
11. IT operations and administration policy: Outlines how all departments and IT work
together to meet compliance and security requirements.
12. SaaS and cloud policy: Provides the organization with clear cloud and SaaS adoption
guidelines, this helps mitigate third-party and fourth-party risk
13. Identity access and management (IAM) policy: Outlines how IT administrators
authorize systems and applications to the right employees and how employees create
passwords to comply with security standards
14. Data security policy: Outlines the technical requirements and acceptable minimum
standards for data security to comply with relevant laws and regulations
15. Privacy regulations: Outlines how the organization complies with government-enforce
regulations such as GDPR that are designed to protect customer privacy
16. Personal and mobile devices policy: Outlines if employees are allowed to use personal
devices to access company infrastructure and how to reduce the risk of exposure from
employee owned assets
There is a lot of work in each of these policies, but you can find many policy templates online.
3.5 Harassment
Harassment can take many forms in words or actions that are either implied or clear and direct. It
is not limited by position, sex, or race. Harassment includes, but is not limited to, sexual
harassment, verbal abuse, or threatening others. Sexual harassment refers to behavior of a sexual
nature that is unwelcome and offensive and is a form of misconduct that undermines the integrity
of the employment relationship. Sexual harassment includes unwelcome sexual advances,
requests for sexual favors, and other verbal or physical conduct or communication of a sexual
nature when:
•Such conduct or communication has the purpose or effect of substantially interfering with an
individual’s employment or creating an intimidating, hostile, or offensive work environment.
• Submission to such conduct or communication is made a term or condition, either explicitly or
implicitly, to obtain employment
• Submission to, or rejection of, such conduct or communication by an individual is used as a
factor in decisions affecting such individual’s employment.
3.6 Fireable Offenses
Employees who commit any of the following will normally be subject to immediate discharge.
This list is not all-inclusive. An employee may be discharged for serious offenses or for any
reason management deems appropriate including:
• Absence without notice for three consecutive work days
• Defrauding the company
• Falsifying company records
• Physical assault
• Possessing, selling, distributing, dispensing, manufacturing, or using illegal drugs while
on company premises or conducting company business
• Theft of company, employee, customer, or supplier information resources or other
property
• Willfully destroying company, employee, customer, or vendor information resources or
other property.
4 CONFLICT OF INTEREST
4.1 Policy
The Company employees are expected to adhere to the highest standards of conduct. To assure
adherence to these standards, employees must have a special sensitivity to conflict-of-interest
situations or relationships, as well as the inappropriateness of personal involvement in them.
Although not always covered by law, these situations can harm The Company or its reputation if
improperly handled.
A conflict of interest occurs when an employee’s personal interests conflict with the company’s
interests. Conflicts of interest may also involve relationships between members of the
employee’s immediate family and The Company. In conflict-of-interest situations, employees are
expected to act in the best interests of the company.
4.2 Standards:
The following standards for ethical behavior are established for all employees in dealing with
conflict-of-interest situations:
When actual or potential conflict-of-interest situations arise, or where there is an appearance of
such conflict, employees shall remove themselves from involvement in the matter. In no case
should employees become involved to the extent where they are or could be influenced to make
decisions that are not in the company’s best interest.
• Employees shall not solicit or accept personal gain, privileges, or other benefits through
involvement in any matters on behalf of The Company. Information Security Policies and
Procedures .
• Employees shall direct their efforts to company business while at work, and shall use company
resources only for management-approved activities. Resources include, but are not limited to,
equipment, supplies, corporate information, and company-paid time.
4.3 Responsibilities:
Employees:
•Whenever faced with an actual or potential business-related conflict-of-interest situation,
employees shall seek guidance from their supervisors.
• When conflict-of-interest questions cannot be resolved within the organizational unit,
employees may request advice from the General Auditor.
• When requested, employees shall also disclose actual and potential conflict-of-interest
situations to the General Auditor.
Management:
The General Auditor shall review each situation and advise the organizational unit of any
recommended action the employee should take.
4.4 Common Conflict-of-Interest Situations
The specific situations described in this section are common, but are not all-inclusive of
business-related conflict-of-interest situations that may arise for The Company employees.
• Gifts, expenses, and products
Giving gifts, providing meals and entertainment, company travel, and offering site tours and
product samples are common business practices. Because the intent of these practices is to build
relationships and influence business decisions, such practices can result in a conflict of interest.
The Company expenses incurred in any of the following situations are subject to organizational
approval.
Gifts: Gifts generally benefit the employee, but not the company. In dealing with suppliers,
customers, or others outside the company, employees shall not accept or give money or gifts,
except an occasional unsolicited, nonmonetary item of a token nature, such as an advertising
novelty of nominal value.
Meals and entertainment: In dealing with suppliers, customers, or others outside the company,
employees shall not accept or provide meals or entertainment, except when there is a business
purpose. The provider of the meal or entertainment should be present at the occasion. Frequent
or repeated acceptance of meals and entertainment may be an indicator of the employee’s
personal gain, and could raise questions about the legitimacy of the business purpose for such
occasions.
Travel: When there is a business purpose for travel, The Company should reimburse all travel
expenses. Employees should not accept air transportation offered by Appendix 1A Typical Tier 1
Policies 183 vendors or others outside the company when convenient commercial transportation
is available. Generally, The Company should pay for lodging expenses.
Product samples: If business dictates that a sample product or service of more than nominal
value is needed, The Company should pay for it.
• Outside work. Employees who have another job outside of The Company shall not represent
themselves as performing work for The Company when working in such jobs. Furthermore, they
may not use The Company resources in performing the other job. Employees shall not be
employed by competitors of The Company.
• Interest in outside business organizations. Employees shall avoid significant financial or
management interest in any business that does or seeks to do business with The Company if such
involvement could cause employees to make business decisions that are not in The Company’s
best interest. • Use of confidential or proprietary information. Employees entrusted with such
information shall restrict access and use to authorized individuals inside and outside the
company who have a clear business need to know this information.
• Insider trading. No employee who has material nonpublic (“insider”) information relating to
The Company or one of its customers may use that information in buying and selling related
securities, either directly or indirectly. Furthermore, employees may not engage in other actions
to take personal advantage of that information or pass it on to others. Even the appearance of an
improper transaction must be avoided to preserve The Company’s reputation for adhering to the
highest standards of conduct.
5 EMPLOYMENT PRACTICES
5.1 Policy
The Company is an Equal Opportunity Employer. Organizational units are responsible for
selecting and maintaining a competent workforce. For hiring, transfers, and promotions,
supervisors will document, as appropriate, the basis for decisions and actions. The organizational
unit shall retain this documentation for seven years.
8 ELECTRONIC COMMUNICATIONS:
8.1 Policy:
The Company maintains electronic communication systems (e-mail, voice-mail, video mail, etc.)
to assist in company business both internally and externally. These systems, including the
equipment and the data stored in the system, are and remain the property of the Company.
• The Company reserves the right to retrieve and review any messages composed, sent, or
received.
• Company-provided electronic communication systems are only to be used for management-
approved activities.
8.2 Responsibilities:
• Employees should be aware that even when messages are deleted or erased, it may still be
possible to recreate the message; therefore, the ultimate privacy of message control may not be
assured.
• While electronic communication systems may accommodate the use of passwords for security,
this control does not ensure message confidentiality.
• Electronic communication messages are not to be created or sent which may constitute
intimidating, hostile, or offensive material on the basis of race, color, creed, religion, national
origin, age, sex, martial status, lawful alien status, non-job-related physical or mental disability,
veteran status, sexual orientation, or other basis prohibited by law (refer to Employee Standards
of Conduct).
8.3 Compliance:
The Company management will:
• Manage corporate information, personnel, and physical property relevant to business
operations, as well as the right to monitor the actual utilization of all corporate assets.
• Ensure that all employees are aware of their obligation to use electronic communication
systems in an ethical and proper manner.
• Note variances from established security practices and for initiating corrective action.
Employees who fail to comply with this policy will be considered to be in violation of the
Company’s Employee Standards of Conduct and will be subject to appropriate corrective action.
The sharing of passwords with unauthorized personnel violates this policy.
9 INTERNET SECURITY:
9.1 Policy:
The Company, through the Internet, provides computing resources to its staff to access
information, communicate, and retrieve and disseminate organization- and businessrelated
information. Use of the public Internet by Company employees is permitted and encouraged
where such use is suitable for business purposes in a manner that is consistent with the Employee
Standards of Conduct and as part of the normal execution of an employee’s job responsibilities.
9.2 Provisions:
The use of company-provided access to the Internet is intended exclusively for management-
approved activities.
• All access to the Internet by employees must be accomplished through the Companyprovided
method. • The Company Chief Information Officer (CIO) must approve all publications/content
files not classified as Public in accordance with the Information Classification policy.
• The Company’s policies regarding Employee Standards of Conduct, Conflict of Interest,
Information Protection, and Information Classification also apply to the use of the Internet.
9.3 Responsibilities:
The Company management will:
• Ensure that all employees are aware of this policy.
• Report all security-related incidents to appropriate management upon discovery.
• Ensure that employees review and sign the Internet Usage and Responsibility Statement.
Employees who fail to comply with this policy will be considered in violation of the Company’s
Employee Standards of Conduct and will be subject to appropriate corrective action.
10 INTERNET USAGE AND RESPONSIBILITY STATEMENT
I,--------------------- acknowledge and understand that access to the Internet, as provided by The
Company, is for management-approved use only. This supports the Company policies on
Employee Standards of Conduct and Information Classification, and among other things,
prohibits the downloading of games, viruses, inappropriate materials or picture files, and
unlicensed software from the Internet. I recognize and accept that while accessing the Internet, I
am responsible for maintaining the highest professional and ethical standards, as outlined in the
Company policy on Employee Standards of Conduct. I have read and understand the policies
mentioned above and accept my responsibility to protect the Company’s information and
reputation. Name------------------------------------Date.
11 EMPLOYEE DISCIPLINE:
11.1 Policy:
Employees found to be in violation of Company policies are subject to appropriate disciplinary
procedures. The Employee Discipline process is a system of performance management that
ensures that individual responsibility for actions by employees is addressed.
11.2 Positive Recognition
• Coaching to improve performance is an effective tool for management to communicate with
employees and informally discuss work performance, attendance, or conduct.
• Company management will coach to help an employee who performs well in a job to reach
higher levels of performance or to correct an emerging employee performance problem.
2.2 Responsibilities:
Employees should be aware that even when messages are deleted or erased, it may still be
possible to recreate the message; therefore, the ultimate privacy of message control may not be
assured.
• While electronic communication systems may accommodate the use of passwords for security,
this control does not ensure message confidentiality.
• Electronic communication messages are not to be created or sent that may constitute
intimidating, hostile, or offensive material on the basis of race, color, creed, religion, national
origin, age, sex, martial status, lawful alien status, non-job-related physical or mental disability,
veteran status, sexual orientation, or other basis prohibited by law (refer to Employee Standards
of Conduct).
2.3 Compliance:
The Company management will:
• Manage corporate information, personnel, and physical property relevant to business
operations, as well as the right to monitor the actual utilization of all corporate assets.
• Ensure that all employees are aware of their obligation to use electronic communication
systems in an ethical and proper manner.
• Note variances from established security practices and for initiating corrective action.
3 INTERNET SECURITY:
3.1 Policy:
The Company, through the Internet, provides computing resources to its staff to access
information, communicate, retrieve, and disseminate organization- and business-related
information. Use of the public Internet by The Company employees is permitted and encouraged
where such use is suitable for business purposes in a manner that is consistent with the Employee
Standards of Conduct and as part of the normal execution of an employee’s job responsibilities.
3.2 Standards:
1.The use of company-provided access to the Internet is intended exclusively for management-
approved activities.
2. All access to the Internet by employees must be accomplished through the Companyprovided
method. 3. The Company Chief Information Officer (CIO) must approve all publications/content
files not classified as Public in accordance with the Information Classification policy.
4. The Company’s policies regarding Employee Standards of Conduct, Conflict of Interest,
Information Protection, and Information Classification also apply to use of the Internet.
3.3 Responsibilities:
The Company management will:
• Ensure that all employees are aware of this policy.
• Report all security-related incidents to appropriate management upon discovery.
• Ensure that employees review and sign the Internet Usage and Responsibility Statement.
3.4 Compliance:
Employees who fail to comply with this policy will be considered to be in violation of The
Company’s Employee Standards of Conduct and will be subject to appropriate corrective action.
4 INTERNET USAGE AND RESPONSIBILITY STATEMENT:
I,----------------------acknowledge and understand that access to the Internet, as provided by The
Company, is for management-approved use only. This supports The Company policies on
Employee Standards of Conduct and Information Classification, and among other things,
prohibits the downloading of games, viruses, inappropriate materials or picture files, and
unlicensed software from the Internet. I recognize and accept that while accessing the Internet, I
am responsible for maintaining the highest professional and ethical standards, as outlined in the
Company policy on Employee Standards of Conduct. I have read and understand the policies
mentioned above and accept my responsibility to protect The Company’s information and
reputation. Name:--------------------------------------- Date
5 COMPUTER AND NETWORK MANAGEMENT:
5.1 Policy:
Responsibilities and procedures for the management and operation of all computers and
networks are assigned in the following manner:
• Clear, documented operating procedures are prepared for all operational computer systems to
ensure their correct, secure operation.
• Incident management responsibilities and procedures are established to ensure quick, effective,
and orderly response to security incidents.
• Management and execution of certain duties and areas of responsibility are kept separate in
order to reduce opportunities for unauthorized modification or misuse of data or services.
• Development and operational facilities are segregated to reduce the risk of accidental changes
or unauthorized access to operational software and business data.
• The risks posed by the use of an external contractor in the management of computer or network
facilities are identified and appropriate security measures are incorporated into contracts.
5.2 Responsibilities:
• Company IT line management has the responsibility to ensure that the measures listed above
are put in place and carried out effectively.
• The Company information security organization has the responsibility to provide services that
will assist IT line management in implementing and monitoring compliance with these measures.
• All employees who install, operate, or maintain computer and network equipment and systems
are required to comply with this policy.
5.3 Scope:
The Computer and Network Management Security policy applies to all computer and network
equipment and systems owned and operated by The Company.
5.4 Compliance:
Company officers and senior management are required to ensure that internal audit mechanisms
exist to monitor and measure compliance with this policy.
Company IT and, where appropriate, business unit line management have the responsibility to
enforce compliance with this policy.
ANTI-VIRUS POLICY:
6.1 Policy:
Precautions are applied to prevent and detect the introduction of malicious software, and
safeguard the integrity of the software and data. Virus detection and prevention measures and
appropriate user awareness procedures are implemented.
6.2 Scope:
The Anti-Virus policy applies to all Company IT systems and networks.
6.3 Responsibilities:
• Company line management has the responsibility to ensure that the measures listed above are
implemented effectively.
• Company information security organization has the responsibility to provide assistance to line
management in the implementation of this policy.
• All users of Company IT systems and networks are to comply with this policy.
6.4 Compliance:
Company officers and senior management are required to ensure that internal audit mechanisms
exist to monitor and measure compliance with this policy.
Company line management has the responsibility to enforce compliance with this policy.
7.1 Policy:
To conduct the business of The Company requires that computer systems and networks be
operated in a safe and secure manner. The primary responsibility for this requirement is assigned
to Information Systems. However, every employee is charged with the responsibility to use the
provided services for the purposes intended and to comply with all security requirements.
7.2 Standards:
Responsibilities and procedures for the management and operation of all computers and
networks are assigned in the following manner:
Clear, documented operating procedures are prepared for all operational computer systems to
ensure their correct, secure operation.
• Incident management responsibilities and procedures are established to ensure quick, effective,
and orderly response to security incidents.
• Management and execution of certain duties and areas of responsibility are kept separate in
order to reduce opportunities for unauthorized modification or misuse of data or services.
• Development and operational facilities are segregated to reduce the risk of accidental changes
or unauthorized access to operational software and business data.
• The risks posed by the use of an external contractor in the management of computer or network
facilities are identified and appropriate security measures are incorporated into contracts.
7.3 Responsibilities:
Company IT line management has the responsibility to ensure that the measures listed above are
put in place and carried out effectively
• The Company information security organization has the responsibility to provide services that
will assist IT line management in implementing and monitoring compliance with these measures.
• All employees who install, operate, or maintain computer and network equipment and systems
are required to comply with this policy.
7.4 Scope:
The Computer and Network Management Security policy applies to all computer and network
equipment and systems owned and operated by The Company.
7.5 Compliance:
Company officers and senior management are required to ensure that internal audit mechanisms
exist to monitor and measure compliance with this policy. Company IT and, where appropriate,
business unit line management has the responsibility to enforce compliance with this policy.
8 PERSONNEL SECURITY:
8.1 Policy:
Information security is addressed at the recruitment stage, included in job descriptions and
contracts, and monitored during an individual’s employment. To ensure compliance with policy
objectives:
• Security responsibilities are stated in employee job descriptions.
• Employment applications for jobs that require access to sensitive information are screened. •
Employees are required to sign nondisclosure agreements.
• Users are trained in security procedures and the correct use of IT facilities before they are
granted access to IT facilities. Users are trained in information security policies and procedures,
security requirements, business controls, and the correct use of IT facilities.
• Incidents affecting security are reported through management channels as quickly as possible.
This is accomplished by:
– Formal reporting and incident response procedures that identify action to be taken on receipt of
an incident report
. – Users who are aware that they are required to note and report all observed or suspected
security weaknesses in or threats to systems or services.
– Users who know to note and report to IT support any software that does not function correctly.
8.2 Scope:
The Personnel Security policy applies to all staff hired by The Company after the
implementation of this policy.
8.3 Responsibilities:
• Company line management has the responsibility to ensure that security responsibilities are
stated in employee job descriptions.
• The Human Resources department has the responsibility to ensure that the other measures in
this policy are in place and properly carried out.
• The Information Security department has the responsibility to implement the educational
material called for in this policy.
8.4 Compliance:
Company officers and senior management are required to ensure that internal audit mechanisms
exist to monitor and measure compliance with this policy.
Company line managers have the responsibility to enforce compliance with this policy.
Violations of security policy reflected in The Company’s Employee Discipline policy.
9 SYSTEMS DEVELOPMENT AND MAINTENANCE POLICY:
9.1 Policy:
To ensure that security is built into IT systems, management identified, justified, agrees to, and
documents security requirements during the requirements phase of an IT system development
project.
Security requirements are included in the requirements analysis stage of each system
development project, and requirements for security controls are specified in statements of
business requirements.
Security controls are designed into applications systems to prevent loss, modification, or misuse
of user data. These controls are:
Validation of data input to applications systems to ensure that it is correct and appropriate
• Incorporation of validation checks into systems to detect corruption caused by processing errors
or through deliberate acts
• Consideration of the use of encryption to safeguard the confidentiality and integrity of highly
sensitive data during transmission or in storage
• Consideration of the use of message authentication for applications where it is vital to protect
the integrity of message content from unauthorized changes or corruption.
9.2 Responsibilities:
Company system development and maintenance management has responsibility to ensure that
the measures listed above are put in place and carried out effectively.
• Company information security organization has the responsibility to provide assistance to
system development and maintenance management in the implementation of this policy.
• All employees engaged in systems development and maintenance are required to comply with
this policy.
9.3 Scope:
The Systems Development and Maintenance Security policy applies to all systems development
and maintenance activities carried out by Company activities.
9.4 Compliance:
Company officers and senior management are required to ensure that internal audit mechanisms
exist to monitor and measure compliance with this policy. Company IT line management has the
responsibility to enforce compliance with this policy.
10 APPLICATION ACCESS CONTROL POLICY
10.1 Policy:
To prevent unauthorized access to information held in information systems. Users of application
systems, including support staff, should be provided with access to information and application
systems and that access should be based on individual business application requirements.
10.2 Standards:
Security tools will be used to control access within application systems. Access to software and
information will be allowed only for authorized users. Only the least amount of access to
software and information—necessary to carry out the tasks for which the access is needed—will
be granted. Application systems will:
• Make sure only the information owner and those people and processes authorized by the
information owner have access to the application system.
• Provide protection against using software utilities that bypass the system or application
controls.
• Control the use of other systems with which our information is shared, to change or delete the
information.
10.3 Responsibilities:
Application owners must ensure compliance with this policy. All employees of The Company or
any other organization who access The Company’s applications, plus information owners and
those who maintain and administer security tools are responsible for complying with this policy.
10.4 Scope:
This policy applies to all Company employees—full-time, part-time, or contract—and anyone
doing business with The Company who has access to The Company’s applications.
10.5 Compliance:
Failure to comply with this policy may result in disciplinary action, which may include
termination of employment.
10.6 Supporting Standards:
To be able to enforce this policy, the Company has established standards that include but are not
limited to:
• Information access restriction.
• Use of system utilities .
• Access control to source libraries .
• Sensitive system isolation.
• Data classification .
• Outside application access restriction.
• External user access request (e.g., Energy WAVES) .
• Vendor support of applications.
•Third-party support.
11 DATA AND SOFTWARE EXCHANGE POLICY:
11.1 Policy:
Exchanges of information and software between The Company and any other organization will
be controlled in accordance with its classification. The exchange of information will comply with
any regulatory policies and legal agreements. Exchanges will be carried out only by prior
agreement. Management approval and/or legal contract will be acquired and documented before
information and software exchanges take place.
11.2 Responsibilities:
Company senior management is responsible for enforcement of compliance with this policy. All
employees of The Company or any other organization—plus information owners and those who
maintain and administer security tools—who access The Company’s applications are responsible
for complying with this policy.
11.3 Scope:
This policy applies to all Company employees—full-time, part-time, or contract—or anyone
doing business with The Company who needs electronic access to The Company’s information
and software.
11.4 Compliance:
Failure to comply with this policy may result in disciplinary action, which may include
termination of employment.
11.5 Supporting Standards:
To be able to enforce this policy, The Company has established standards that include but are not
limited to:
•Encryption
• Digital certificates
• E-mail security
• E-business transactions
• FTP • Instant messaging
• EDI data exchange
• Message digest
• Information and software exchange agreements
• Security of media in transit
• Security of electronic office systems
• Publicly available systems
• Other forms of information exchange