Information Security Policies and Procedures: Corporate Policies-Tier 1, Tier 2 and Tier3 Policies

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 42

CYBER LAWS AND ETHICS

UNIT -3 NOTES
Information security policies and procedures: Corporate policies- Tier 1, Tier 2 and Tier3
policies
Information Security Policy (ISP) is a set of rules enacted by an organization to ensure that all
users or networks of the IT structure within the organization's domain abide by the prescriptions
regarding the security of data stored digitally within the boundaries the organization stretches its
authority.
An information security policy (ISP) is a set of rules, policies and procedures designed to ensure
all users and networks within an organization meet minimum IT security and data protection
security requirements.

ISPs should address all data, programs, systems, facilities, infrastructure, users, third-parties and
fourth-parties of an organization.

What is the purpose of an information security policy?


An information security policy aims to enact protections and limit the distribution of data to only
those with authorized access. Organizations create ISPs to:

 Establish a general approach to information security


 Document security measures and user access control policies
 Detect and minimize the impact of compromised information assets such as misuse of
data, networks, mobile devices, computers and applications
 Protect the reputation of the organization
 Comply with legal and regulatory requirements like NIST, GDPR, HIPAA and FERPA
 Protect their customer's data, such as credit card numbers
 Provide effective mechanisms to respond to complaints and queries related to real or
perceived cyber security risks such as phishing, malware and ransomware
 Limit access to key information technology assets to those who have an acceptable use

Why is an information security policy is important?


Creating an effective information security policy and ensuring compliance is a critical step in
preventing security incidents like data leaks and data breaches.

ISPs are important for new and established organizations. Increasing digitalization means every
employee is generating data and a portion of that data must be protected from unauthorized
access. Depending on your industry, it may even be protected by laws and regulations.
Sensitive data, personally identifiable information (PII), and intellectual property must be
protected to a higher standard than other data.

Whether you like it or not, information security (InfoSec) is important at every level of your


organization. And outside of your organization.

Increased outsourcing means third-party vendors have access to data too. This is why third-party
risk management and vendor risk management is part of any good information security
policy. Third-party risk, fourth-party risk and vendor risk are no joke

What are the key elements of an information security policy?


An information security policy can be as broad as you want it to be. It can cover IT security
and/or physical security, as well as social media usage, lifecycle management and security
training. In general, an information security policy will have these nine key elements:

1. Purpose
Outline the purpose of your information security policy which could be to:

 Create an organizational model for information security


 Detect and preempt information security breaches caused by third-party vendors, misuse
of networks, data, applications, computer systems and mobile devices.
 Protect the organization's reputation
 Uphold ethical, legal and regulatory requirements
 Protect customer data and respond to inquiries and complaints about non-compliance of
security requirements and data protection

2. Audience
Define who the information security policy applies to and who it does not apply to. You may be
tempted to say that third-party vendors are not included as part of your information security
policy.

This may not be a great idea. Third-party, fourth-party risk and vendor risk should be accounted


for. Whether or not you have a legal or regulatory duty to protect your customer's data from
third-party data breaches and data leaks isn't important. Customers may still blame your
organization for breaches that were not in your total control and the reputational damage can be
huge.
3. Information security objectives
These are the goals management has agreed upon, as well as the strategies used to achieve them.

In the end, information security is concerned with the CIA triad:

 Confidentiality: data and information are protected from unauthorized access


 Integrity: Data is intact, complete and accurate
 Availability: IT systems are available when needed

4. Authority and access control policy


This part is about deciding who has the authority to decide what data can be shared and what
can't. Remember, this may not be always up to your organization. For example, if you are the
CSO at a hospital. You likely need to comply with HIPAA and its data protection requirements.
If you store medical records, they can't be shared with an unauthorized party whether in person
or online.

An access control policy can help outline the level of authority over data and IT systems for
every level of your organization. It should outline how to handle sensitive data, who is
responsible for security controls, what access control is in place and what security standards are
acceptable.

It may also include a network security policy that outlines who can have access to company
networks and servers, as well as what authentication requirements are needed including strong
password requirements, biometrics, ID cards and access tokens.

In some cases, employees are contractually bound to comply with the information security policy
before being granted access to any information systems and data centers.

5. Data classification
An information security policy must classify data into categories. A good way to classify the data
is into five levels that dictate an increasing need for protection:

1. Level 1: Public information


2. Level 2: Information your organization has chosen to keep confidential but disclosure
would not cause material harm
3. Level 3: Information has a risk of material harm to individuals or your organization if
disclosed
4. Level 4: Information has a high risk of causing serious harm to individuals or your
organization if disclosed
5. Level 5: Information will cause severe harm to individuals or your organization if
disclosed
In this classification, levels 2-5 would be classified as confidential information and would need
some form of protection.

Read our full guide on data classification here.

6. Data support and operations


Once data has been classified, you need to outline how data is each level will be handled. There
are generally three components to this part of your information security policy:

1. Data protection regulations: Organizations that store personally identifiable


information (PII) or sensitive data must be protected according to organizational
standards, best practices, industry compliance standards and regulation
2. Data backup requirements: Outlines how data is backed up, what level of encryption is
used and what third-party service providers are used
3. Movement of data: Outlines how data is communicated. Data that is deemed classified
in the above data classification should be securely communicated with encryption and not
transmitted across public networks to avoid man-in-the-middle attacks

7. Security awareness training


A perfect information security policy that no one follows is no better than having no policy at all.
You need your staff to understand what is required of them. Training should be conducted to
inform employees of security requirements, including data protection, data classification, access
control and general cyber threats.

Security training should include:

 Social engineering: Teach your employees about phishing, spearphishing and other


common social engineering cyber attacks
 Clean desk policy: Laptops should be taken home and documents shouldn't be left on
desks at the end of the work day
 Acceptable usage: What can employees use their work devices and Internet for and what
is restricted?

8. Responsibilities and duties of employees


This is where you operationalize your information security policy. This part of your information
security policy needs to outline the owners of:

 Security programs
 Acceptable use policies
 Network security
 Physical security
 Business continuity
 Access management
 Security awareness
 Risk assessments
 Incident response
 Data security
 Disaster recovery
 Incident management

9. Other items an ISP may include


Virus protection procedure, malware protection procedure, network intrusion
detection procedure, remote work procedure, technical guidelines, consequences for non-
compliance, physical security requirements, references to supporting documents, etc.

What are the best practices for information security management?


A mature information security policy will outline or refer to the following policies:

1. Acceptable use policy (AUP): Outlines the constraints an employee must agree to use a
corporate computer and/or network
2. Access control policy (ACP): Outlines access controls to an organization's data and
information systems
3. Change management policy: Refers to the formal process for making changes to IT,
software development and security
4. Information security policy: High-level policy that covers a large number of security
controls
5. Incident response (IR) policy : An organized approach to how the organization will
manage and remediate an incident
6. Remote access policy: Outlines acceptable methods of remotely connecting to internal
networks
7. Email/communication policy: Outlines how employees can use the business's chosen
electronic communication channel such as email, slack or social media
8. Disaster recovery policy: Outlines the organization's cybersecurity and IT teams input
into an overall business continuity plan
9. Business continuity plan (BCP): Coordinates efforts across the organization and is used
in the event of a disaster to restore the business to a working order
10. Data classification policy: Outlines how your organization classifies its data
11. IT operations and administration policy: Outlines how all departments and IT work
together to meet compliance and security requirements.
12. SaaS and cloud policy: Provides the organization with clear cloud and SaaS adoption
guidelines, this helps mitigate third-party and fourth-party risk
13. Identity access and management (IAM) policy: Outlines how IT administrators
authorize systems and applications to the right employees and how employees create
passwords to comply with security standards
14. Data security policy: Outlines the technical requirements and acceptable minimum
standards for data security to comply with relevant laws and regulations
15. Privacy regulations: Outlines how the organization complies with government-enforce
regulations such as GDPR that are designed to protect customer privacy
16. Personal and mobile devices policy: Outlines if employees are allowed to use personal
devices to access company infrastructure and how to reduce the risk of exposure from
employee owned assets
There is a lot of work in each of these policies, but you can find many policy templates online.

Corporate policies- Tier 1, Tier 2 and Tier3 policies


Most organizations have a standard set of policies that govern the way they perform their
business (see Figure 1). There are at least 11 Tier 1 policies; this means that a policy is
implemented to support the entire business or mission of the enterprise. There are also Tier 2
policies; these are topic-specific policies and address issues related to specific subject matter.
The Tier 3 policies address the requirements for using and supporting specific applications. Later
in the book we present examples of a number each of these policies; for now, we present the Tier
1 policy title and a brief description of what the policy encompasses. The remainder of this
appendix presents Tier 1 organization-wide policies. These are examples of what a typical policy
might look like. As discussed in Chapter 1, each policy has a direct bearing on the overall
information security program. Make certain to review your organization’s policies and see that,
wherever appropriate, the information security language is incorporated.
2.1 Shared Beliefs:
The Company’s customers have entrusted the employees of The Company with important
responsibilities: to increase their value by providing premier, world-class information technology
services and solutions. We have committed ourselves to fulfilling those responsibilities,
recognizing that the commitment requires the personal dedication and leadership of each of us
and the collective effort of all of us.
We are committed to teamwork and accountability. We believe that unless we conduct
ourselves as a team—and build team effort throughout the company—we cannot succeed.
Further, we believe that a team succeeds only when all members understand the team goals, their
individual roles, and how each person’s performance and commitment contribute to achieving
the goals. Our commitment to this concept is reflected in our willingness to accept accountability
for results and to stake our personal success on those results.
We are committed to communication. We practice open, honest, two-way communication and
provide regular feedback. We believe that written communication cannot replace dialogue
between people; that effective communication is a prerequisite to effect action; and that trust,
respect, and understanding are necessary for effective communication. We set examples through
our behavior because our actions do, in fact, speak louder than our words.
We are committed to continuous improvement and benchmarking. Continuous improvement
in our skills, methods, and results is vital to our success in the highly competitive information
security sector. We measure our success and our improvement by comparing our performance
with that of our competitors and other companies that are world-class performers. We recognize
that just as we strive for improved performance, so do our competitors. Benchmarking and
continuous improvement, therefore, are ongoing processes that will ensure that our sights are
constantly on target to become superior performers. Our dedication to living these commitments
will produce an environment in which employees are involved—involved in the goals of the
company and their individual work groups—and sharing ideas and suggestions as valued
contributors. In this way, we will provide value to customers and employees alike. Our goal is
that every employee becomes committed to our shared beliefs.
3 EMPLOYEE STANDARDS OF CONDUCT
The Company employees are expected to conduct themselves in a professional and business-like
manner at all times when on company property or when representing the company.
3.2 Responsibilities
Employees:
• Shall act in an ethical manner, and shall avoid actions that have the appearance of being
unethical.
• Shall abide by applicable laws, regulations, and professional standards.
• Shall avoid situations in which there may be a conflict of interest (see Conflict of Interest
policy for more information).
• Shall meet individual performance expectations.
• Shall abide by company policies and practices.
• Shall accurately and honestly record and report corporate information in a timely manner.
• Shall also maintain the confidentiality of corporate information (see Information Classification
policy).
• Shall treat co-workers and others with dignity and respect.
• Are expected to use intelligence, common sense, and good judgment in applying these
standards of conduct.
• Shall direct questions relating to the standards of conduct to their supervisors.
• Who observe conduct that does not appear consistent with these standards of conduct should
discuss the matter with their supervisor; the supervisor shall report fraudulent activity to the
General Counsel.
• Who have suffered a violation of the standards of conduct should immediately report the matter
to their supervisor or to the Vice President, Human Resources.
Managers and Supervisors:
• Shall be investigated in as discreet a fashion as possible. Once the investigation is complete,
appropriate action will be taken.
• Shall provide appropriate feedback to those who report misconduct.
• Shall retaliate against employees who report suspected misconduct.
• Will manage corporate information, personnel, and physical properties relevant to their
business operations, as well as monitor the actual utilization of all corporate assets.
3.3 Compliance
Employees who violate these standards of conduct are subject to disciplinary action up to and
including discharge. In some cases, employees may also be subject to criminal charges.
The Company management has the responsibility to ensure that all employees are aware of their
obligation to behave in an ethical manner and to note variances from established conduct
standards and initiate appropriate corrective action.
3.4 Unacceptable Conduct
Supervisors shall follow appropriate disciplinary procedures, up to and including discharge, for
employees whose work performance or behavior does not meet the Information Security Policies
and Procedures 180 standards of conduct. Some examples of unacceptable conduct are shown
below.
This list is not all-inclusive.
Work performance:
Failure to meet job requirements –
Unacceptable work performance
Attendance and tardiness:
Absence without notice or permission –
Failure to notify as required –
Excessive tardiness or excessive absence
General conduct:
– Conflict of interest activities –
-Dishonesty
– Failure to maintain acceptable appearance and hygiene standards
– Gambling or operating a lottery while on the job
– Possession of unauthorized weapons or cameras on company property
– Sleeping on the job
– Unauthorized use or possession of company property
– Insubordination
– Violation of a copyright or software licensing agreement, including the introduction of non-
company-approved software or code into any company system.

3.5 Harassment
Harassment can take many forms in words or actions that are either implied or clear and direct. It
is not limited by position, sex, or race. Harassment includes, but is not limited to, sexual
harassment, verbal abuse, or threatening others. Sexual harassment refers to behavior of a sexual
nature that is unwelcome and offensive and is a form of misconduct that undermines the integrity
of the employment relationship. Sexual harassment includes unwelcome sexual advances,
requests for sexual favors, and other verbal or physical conduct or communication of a sexual
nature when:
•Such conduct or communication has the purpose or effect of substantially interfering with an
individual’s employment or creating an intimidating, hostile, or offensive work environment.
• Submission to such conduct or communication is made a term or condition, either explicitly or
implicitly, to obtain employment
• Submission to, or rejection of, such conduct or communication by an individual is used as a
factor in decisions affecting such individual’s employment.
3.6 Fireable Offenses
Employees who commit any of the following will normally be subject to immediate discharge.
This list is not all-inclusive. An employee may be discharged for serious offenses or for any
reason management deems appropriate including:
• Absence without notice for three consecutive work days
• Defrauding the company
• Falsifying company records
• Physical assault
• Possessing, selling, distributing, dispensing, manufacturing, or using illegal drugs while
on company premises or conducting company business
• Theft of company, employee, customer, or supplier information resources or other
property
• Willfully destroying company, employee, customer, or vendor information resources or
other property.
4 CONFLICT OF INTEREST
4.1 Policy
The Company employees are expected to adhere to the highest standards of conduct. To assure
adherence to these standards, employees must have a special sensitivity to conflict-of-interest
situations or relationships, as well as the inappropriateness of personal involvement in them.
Although not always covered by law, these situations can harm The Company or its reputation if
improperly handled.
A conflict of interest occurs when an employee’s personal interests conflict with the company’s
interests. Conflicts of interest may also involve relationships between members of the
employee’s immediate family and The Company. In conflict-of-interest situations, employees are
expected to act in the best interests of the company.
4.2 Standards:
The following standards for ethical behavior are established for all employees in dealing with
conflict-of-interest situations:
When actual or potential conflict-of-interest situations arise, or where there is an appearance of
such conflict, employees shall remove themselves from involvement in the matter. In no case
should employees become involved to the extent where they are or could be influenced to make
decisions that are not in the company’s best interest.
• Employees shall not solicit or accept personal gain, privileges, or other benefits through
involvement in any matters on behalf of The Company. Information Security Policies and
Procedures .
• Employees shall direct their efforts to company business while at work, and shall use company
resources only for management-approved activities. Resources include, but are not limited to,
equipment, supplies, corporate information, and company-paid time.
4.3 Responsibilities:
Employees:
•Whenever faced with an actual or potential business-related conflict-of-interest situation,
employees shall seek guidance from their supervisors.
• When conflict-of-interest questions cannot be resolved within the organizational unit,
employees may request advice from the General Auditor.
• When requested, employees shall also disclose actual and potential conflict-of-interest
situations to the General Auditor.
Management:
The General Auditor shall review each situation and advise the organizational unit of any
recommended action the employee should take.
4.4 Common Conflict-of-Interest Situations
The specific situations described in this section are common, but are not all-inclusive of
business-related conflict-of-interest situations that may arise for The Company employees.
• Gifts, expenses, and products
Giving gifts, providing meals and entertainment, company travel, and offering site tours and
product samples are common business practices. Because the intent of these practices is to build
relationships and influence business decisions, such practices can result in a conflict of interest.
The Company expenses incurred in any of the following situations are subject to organizational
approval.
Gifts: Gifts generally benefit the employee, but not the company. In dealing with suppliers,
customers, or others outside the company, employees shall not accept or give money or gifts,
except an occasional unsolicited, nonmonetary item of a token nature, such as an advertising
novelty of nominal value.
Meals and entertainment: In dealing with suppliers, customers, or others outside the company,
employees shall not accept or provide meals or entertainment, except when there is a business
purpose. The provider of the meal or entertainment should be present at the occasion. Frequent
or repeated acceptance of meals and entertainment may be an indicator of the employee’s
personal gain, and could raise questions about the legitimacy of the business purpose for such
occasions.
Travel: When there is a business purpose for travel, The Company should reimburse all travel
expenses. Employees should not accept air transportation offered by Appendix 1A Typical Tier 1
Policies 183 vendors or others outside the company when convenient commercial transportation
is available. Generally, The Company should pay for lodging expenses.
Product samples: If business dictates that a sample product or service of more than nominal
value is needed, The Company should pay for it.
• Outside work. Employees who have another job outside of The Company shall not represent
themselves as performing work for The Company when working in such jobs. Furthermore, they
may not use The Company resources in performing the other job. Employees shall not be
employed by competitors of The Company.
• Interest in outside business organizations. Employees shall avoid significant financial or
management interest in any business that does or seeks to do business with The Company if such
involvement could cause employees to make business decisions that are not in The Company’s
best interest. • Use of confidential or proprietary information. Employees entrusted with such
information shall restrict access and use to authorized individuals inside and outside the
company who have a clear business need to know this information.
• Insider trading. No employee who has material nonpublic (“insider”) information relating to
The Company or one of its customers may use that information in buying and selling related
securities, either directly or indirectly. Furthermore, employees may not engage in other actions
to take personal advantage of that information or pass it on to others. Even the appearance of an
improper transaction must be avoided to preserve The Company’s reputation for adhering to the
highest standards of conduct.
5 EMPLOYMENT PRACTICES
5.1 Policy
The Company is an Equal Opportunity Employer. Organizational units are responsible for
selecting and maintaining a competent workforce. For hiring, transfers, and promotions,
supervisors will document, as appropriate, the basis for decisions and actions. The organizational
unit shall retain this documentation for seven years.

5.2 Filling Job Vacancies


When an organizational unit identifies a need to establish a new position, they shall consult with
Human Resources to establish the position and post the job vacancy.
• The Vice President of the hiring organization shall approve any decision to hire.
• Organizational units may contact Recruiting Selection Staffing (RSS) for assistance in filing
job vacancies. RSS can assist the organizational unit by providing:
Company-wide posting of opening
– Screening applications for minimum requirement qualifications.
– Coordinating medical examinations or skill aptitude tests.
– Scheduling background checks where appropriate.

5.3 Termination of Employment:


Termination of employment may be either involuntary or voluntary. All paperwork for employee
termination must be maintained for seven years. For information regarding discharge, refer to the
Employee Discipline Policy.
5.4 Responsibilities
When terminating employment, employees have the responsibility to:
• Notify management in writing at least two weeks prior to resignation date.
• Notify management 90 days prior to retirement date.
• Return all Company property, including intellectual property, hardware, and software. The
Company Management has the responsibility to:
• Check all outstanding payroll deduction balances before authorizing release of employee’s final
payroll check.
• Obtain all Company property, including such items as identification badges, keys, parking tags,
access cards, and computer equipment.
• Give approval all employee personal property being removed from the premises.
• Contact RSS to conduct an Employee Exit Interview.
6 RECORDS MANAGEMENT:
6.1 Policy:
It is the policy of the Company to accommodate the timely storage, retrieval, and disposition of
records created, utilized, and maintained by the various departments. The period of time that
records are maintained is based on the minimum requirements set forth in state and federal
retention schedules.
6.2 Role of Retention Center:
The role of the Retention Center is to receive, maintain, destroy, and service inactive records that
have not met their disposition date. Each business unit is to establish schedules to comply with
the minimum amount of time records should be maintained in compliance with state and federal
guidelines. Retention requirements apply whether or not the records are transferred to the
Retention Center. Copies of the schedules must be maintained by the business unit and available
for inspection
6.3 Role of Records Manager:
The role of the Records Manager is to administer the Records Management program. The
Records Manager is well acquainted with all records and record groups within an agency and has
expertise in all aspects of records management.
The duties of the Records Manager include planning, development, and administration of
records management policies. These duties also include the annual organizationwide inventory of
all information assets to be conducted by the business unit manager with reports sent to the
Records Manager.
6.4 Role of Management Personnel:
Management Personnel are responsible for records under their control.
6.5 Role of Departmental Records Coordinator
The Departmental Records Coordinator is a liaison between the department and the Retention
Center. It is recommended that each department appoint a Records Coordinator in writing. The
letter of appointment should include the Records Coordinator’s full name, department, and
telephone extension. The letter should be forwarded to the Retention Center and maintained on
file.
6.6 Type of Documents Maintained in Retention Center:
Record Retention accepts only public records that are referenced in the State Retention Schedule,
except student transcripts. Copies of student transcripts may be obtained from Records and
Admissions located at the Student Service Center.
• Record Retention does not accept personal, active, or non-records.
• Record Retention stores only inactive and permanent records until final disposition according
to state and federal retention schedules. Examples include personnel files, purchase orders, grade
books, or surveys.
• Record Retention receives and stores inactive permanent records from TVI departments until
final disposition according to state and federal retention guidelines.
• Record Retention ensures records are classified according to state and retention guidelines.
• Record Retention ensures records are tracked and entered into an electronic records
management software system that tracks record boxes, and assigns retention schedules,
permanent box numbers, destruction dates, and shelf locations.
6.7 Services:
• If a department has obsolete records that are deemed confidential or sensitive, or copies of non-
records, a special request for shredding may be sent to the Record Retention Center. The records
can be shredded by the Record Retention Center staff or transferred to the State Record Center
for destruction.
• Departments must complete a Request for Destruction form for confidential or nonrecords to be
shredded. Departments are required to purchase forms from Central Stores at Shipping &
Receiving.
• The Record Retention Center provides consulting services to departments on filing systems and
maintenance of records.
6.8 Transferring Records:
• Departments should transfer records to Record Retention for storage in January, July, and
October.
• Records with a retention period of two years or more should be transferred to Record
Retention.
6.9 Record Retrieval:
Records are retrieved and delivered to customers by request, given 24-hour notice.
• Records can be retrieved for customers on an emergency basis as requested.
• Management personnel, the records coordinator, or the requester will sign for receipt of
records. Records are to be checked out for no longer than 30 days. If a longer period is required,
a written request should be sent to the Retention Center. If records are checked out for more than
a year, the records will be permanently withdrawn from inventory.
• Permanent Withdrawal: If a department wishes to withdraw a record permanently from storage,
forward a request to the Record Retention Center by phone, fax, or interoffice mail. The
department will complete a Withdrawal Request form and the records will be deleted from
inventory.
• Second-Party Withdrawal: If a department requests a record originating from another
department, then the requesting department must contact the department of origin to obtain
authorization. The department of origin will contact the Record Retention Center for records
withdrawal. The department requester must view the requested records at the Record Retention
Center.
• Records should not be returned via inter-office mail, due to the confidential nature of the
documents.
6.10 Record Destruction:
Record Retention destroys records according to state guidelines in January, July, and October.
• Records are destroyed by the Record Retention Center according to state and federal guidelines
when legal requirements are met. A Destruction Request form will be sent to the originating
department for review and signature by the Departmental Records Coordinator and by
management personnel. Only when the Destruction Request has been reviewed, signed, and
returned to Record Retention will the expired records be destroyed. Authorized personnel will
shred confidential records. If departments wish to keep the records past their assigned destruction
date, management personnel can extend the date no longer than one year unless a litigation,
audit, or investigation is pending. Records kept by the department past the retention date of
destruction will be permanently withdrawn from inventory.
• All records scheduled for destruction are reviewed by the Institute’s Records Manager and by
State Records Analysts for approval.
7 CORPORATE COMMUNICATIONS:
7.1 Policy
Correspondence, in whatever format, represents the Company to the out-side world. It is vital
that all communications reflect ethical and legal behavior. As an employee of the Company, you
are responsible for ensuring that all correspondence, regardless of the format (letter format, e-
mail, voice-mail, Internet, presentations, etc.), meets these standards.
7.2 Standards
All Company communications shall be:
• Truthful, credible, and consistent with the company’s performance and actions
• In accordance with applicable Company policies, state and federal laws, and regulatory
requirements.
7.3 Responsibilities:
•Employees who fail to comply with this policy will be considered in violation of the Company’s
Employee Standards of Conduct and will be subject to appropriate corrective action. The
Company Management has the responsibility to:
• Ensure that all employees are aware of their rights and obligations relating to Company
correspondence. • Implement security practices and procedures that are consistent with Company
policies in all forms of communication.
• Note variances from established security practices and for initiating appropriate corrective
action.

8 ELECTRONIC COMMUNICATIONS:
8.1 Policy:
The Company maintains electronic communication systems (e-mail, voice-mail, video mail, etc.)
to assist in company business both internally and externally. These systems, including the
equipment and the data stored in the system, are and remain the property of the Company.
• The Company reserves the right to retrieve and review any messages composed, sent, or
received.
• Company-provided electronic communication systems are only to be used for management-
approved activities.
8.2 Responsibilities:
• Employees should be aware that even when messages are deleted or erased, it may still be
possible to recreate the message; therefore, the ultimate privacy of message control may not be
assured.
• While electronic communication systems may accommodate the use of passwords for security,
this control does not ensure message confidentiality.
• Electronic communication messages are not to be created or sent which may constitute
intimidating, hostile, or offensive material on the basis of race, color, creed, religion, national
origin, age, sex, martial status, lawful alien status, non-job-related physical or mental disability,
veteran status, sexual orientation, or other basis prohibited by law (refer to Employee Standards
of Conduct).
8.3 Compliance:
The Company management will:
• Manage corporate information, personnel, and physical property relevant to business
operations, as well as the right to monitor the actual utilization of all corporate assets.
• Ensure that all employees are aware of their obligation to use electronic communication
systems in an ethical and proper manner.
• Note variances from established security practices and for initiating corrective action.
Employees who fail to comply with this policy will be considered to be in violation of the
Company’s Employee Standards of Conduct and will be subject to appropriate corrective action.
The sharing of passwords with unauthorized personnel violates this policy.
9 INTERNET SECURITY:
9.1 Policy:
The Company, through the Internet, provides computing resources to its staff to access
information, communicate, and retrieve and disseminate organization- and businessrelated
information. Use of the public Internet by Company employees is permitted and encouraged
where such use is suitable for business purposes in a manner that is consistent with the Employee
Standards of Conduct and as part of the normal execution of an employee’s job responsibilities.

9.2 Provisions:
The use of company-provided access to the Internet is intended exclusively for management-
approved activities.
• All access to the Internet by employees must be accomplished through the Companyprovided
method. • The Company Chief Information Officer (CIO) must approve all publications/content
files not classified as Public in accordance with the Information Classification policy.
• The Company’s policies regarding Employee Standards of Conduct, Conflict of Interest,
Information Protection, and Information Classification also apply to the use of the Internet.
9.3 Responsibilities:
The Company management will:
• Ensure that all employees are aware of this policy.
• Report all security-related incidents to appropriate management upon discovery.
• Ensure that employees review and sign the Internet Usage and Responsibility Statement.
Employees who fail to comply with this policy will be considered in violation of the Company’s
Employee Standards of Conduct and will be subject to appropriate corrective action.
10 INTERNET USAGE AND RESPONSIBILITY STATEMENT
I,--------------------- acknowledge and understand that access to the Internet, as provided by The
Company, is for management-approved use only. This supports the Company policies on
Employee Standards of Conduct and Information Classification, and among other things,
prohibits the downloading of games, viruses, inappropriate materials or picture files, and
unlicensed software from the Internet. I recognize and accept that while accessing the Internet, I
am responsible for maintaining the highest professional and ethical standards, as outlined in the
Company policy on Employee Standards of Conduct. I have read and understand the policies
mentioned above and accept my responsibility to protect the Company’s information and
reputation. Name------------------------------------Date.
11 EMPLOYEE DISCIPLINE:
11.1 Policy:
Employees found to be in violation of Company policies are subject to appropriate disciplinary
procedures. The Employee Discipline process is a system of performance management that
ensures that individual responsibility for actions by employees is addressed.
11.2 Positive Recognition
• Coaching to improve performance is an effective tool for management to communicate with
employees and informally discuss work performance, attendance, or conduct.
• Company management will coach to help an employee who performs well in a job to reach
higher levels of performance or to correct an emerging employee performance problem.

11.3 Formal Discipline:


Formal discipline is a series of corrective steps taken to improve performance and change
behavior. Formal discipline is issued when an employee does not respond to coaching or a
performance is serious enough to warrant formal discipline.
The decision to issue discipline and the level of discipline issued depend on the seriousness of
the offense and the employee’s record, and it is within the sole exclusive discretion of
management.
There are three formal discipline levels: oral reminder, written reminder, and decision making
leave (DML).
Oral reminder. This is the first level of formal discipline. Employees may have a maximum of
three active oral reminders at any time, and they must each be in separate categories. An oral
reminder remains active for six months.
• Written reminder. This is issued when an employee’s commitment to improve is not met
within the six-month oral reminder active period. Only two written reminders may be active at
any one time, and they must be in different categories. A written reminder must be reviewed with
Human Resources and, if appropriate, Labor Relations prior to issuance. A written reminder
remains active for 12 months.
• Decision-making leave (DML). This is the final level of formal discipline. When a DML is
issued, the employee is directed to take the following workday off, with pay, to decide if a
commitment to overall satisfactory performance improvement can be made. A DML must be
reviewed prior to issuance with Human Resources and, if appropriate, Labor Relations. There
may be only one active DML and it remains in effect for 18 months.
11.4 Deactivation:
Once the time period prescribed for the formal levels of discipline is deactivated, the discipline
shall be disregarded for purposes of further discipline. The expired formal documentation is to be
removed from the employee’s organizational unit personnel record. All records of formal
discipline will remain part of the Company’s permanent records.
11.5 Discharge
A discharge is normally issued when, in management’s judgment, other levels of discipline are
unsuccessful in getting the employee to correct unacceptable performance or the offense is
serious enough to warrant immediate discharge.
However, an employee may be discharged for any reason management deems appropriate.
Management’s judgment is final and exclusive, subject to limited review only under the
Employee Review System or applicable labor agreement grievance procedure.
An employee may be discharged if a performance problem that warrants formal discipline occurs
during a period when a DML is active. Immediate discharge without following the normal
Employee Discipline process may also occur. Dischargeable offenses are listed in the Employee
Standards of Conduct.
12 GENERAL SECURITY:
12.1 Policy
It is the responsibility of Company management to provide a safe and secure workplace for all
employees.
12.2 Standards:
The Company offices will be protected from unauthorized access.
• Areas within buildings that house sensitive or high-risk equipment will be protected against
fire, water, and other hazards.
• Devices that are critical to the operation of company business processes will be protected
against power failure.
12.3 Responsibilities:
• Senior management and the officers of the Company are required to maintain accurate records
and to employ internal controls designed to safeguard company assets and property against
unauthorized use or disposition.
• The Company assets include but are not limited to physical property, intellectual property,
patents, trade secrets, copyrights, and trademarks.
• Additionally, it is the responsibility of Company line management to ensure that staff is aware
of, and fully complies with, the Company’s security guidelines and all relevant laws and
regulations.
12.4 Compliance:
• Management is responsible for conducting periodic reviews and audits to assure compliance
with all policies, procedures, practices, standards, and guidelines.
Employees who fail to comply with the policies will be treated as being in violation of the
Employee Standards of Conduct and will be subject to appropriate corrective action.
13 BUSINESS CONTINUITY PLANNING:
13.1 Policy:
The continued operations of Company business activities in the event of an emergency must be
addressed by each business unit in a Business Continuity Plan (BCP). The business unit BCPs
must be coordinated with the Company BCP and the Company Emergency Response Plan.
13.2 Standards:
• Every business unit will have a documented and tested BCP.
• Each business unit will conduct a Business Impact Analysis (BIA) to determine its critical
business processes, applications, systems, and platforms. The BIA results will be presented to the
Information Security Steering Committee (ISSC) for review and approval.
• The BIAs will be reviewed annually by the business unit to ensure the results are still
appropriate.
• The business unit BCPs must be coordinated with the Company-wide BCP.
13.3 Responsibilities:
• Senior management and the officers of the Company are required to review and approve
business unit BCPs as well as the Company BCP.
• Additionally, it is the responsibility of company line management to ensure that the business
unit BCP is current.
13.4 Compliance:
Management is responsible for conducting periodic tests of the BCP to ensure that the continued
processing requirements of the Company are met.
14 INFORMATION PROTECTION/;
14.1 Policy:
Information is a Company asset and is the property of the Company. The Company information
includes information that is electronically generated, printed, filmed, typed, stored, or verbally
communicated. Information must be protected according to its sensitivity, criticality, and value,
regardless of the media on which it is stored, the manual or automated systems that process it, or
the methods by which it is distributed. Customer information that has been entrusted to the
Company will also be safeguarded in accordance with this policy. To ensure that business
objectives and customer confidence are maintained, all employees have a responsibility to
protect information from unauthorized access, modification, disclosure, and destruction, whether
accidental or intentional.
14.2 Responsibilities:
• Senior management and the Officers of the Company are required to employ internal controls
designed to safeguard company assets, including business information.
• It is a line management obligation to ensure that all employees understand and comply with the
Company’s security policies and standards, as well as all applicable laws and regulations.
• Employee responsibilities for protecting Company information are detailed in the Information
Classification policy.
14.3 Compliance:
• Company management has the responsibility to manage corporate information, personnel, and
physical property relevant to business operations, as well as the right to monitor the actual
utilization of all corporate assets.
• Employees who fail to comply with the policies will be considered in violation of the
Company’s Employee Standards of Conduct and will be subject to appropriate corrective action.
15 INFORMATION CLASSIFICATION:
15.1 Policy:
Information is a company asset and is the property of the Company. Company information
includes information that is electronically generated, printed, filmed, typed, stored, or verbally
communicated. Information must be protected according to its sensitivity, criticality, and value,
regardless of the media on which it is stored, the manual or automated systems that process it, or
the methods by which it is distributed.
15.2 Classification Levels:
To ensure the proper protection of corporate information, the Owner (defined below) shall use a
formal review process to classify information into one of the following three classifications:
Public, Confidential, and Internal Use.
Public information is information that has been made available for public distribution through
authorized Company channels. (Refer to Corporate Communications policy for more
information.) This information is available to anyone inside or outside the Company. Access to
Public information is unrestricted. Examples include items such as company brochures,
marketing presentations, and news releases.
Confidential.
Company Confidential information may also include:
All proprietary information that also is a trade secret. Not all proprietary information, however,
is a trade secret, and therefore confidential. For example, a company-wide broadcast is
proprietary but not confidential. Such information will be classified as Public or Internal Use, but
should be labeled with a copyright notice, if appropriate;
• Contracts that the Company considers confidential or that contain nondisclosure provisions;
• Employee information, such as personal information, medical information, compensation and
benefits information, performance appraisals, records of disciplinary action, and other similar
information.
• Information from an outside entity that is in the Company’s possession and is confidential
because of a contract provision or other legal obligation to treat the information confidentially; or
• Information related to outside entities, market conditions and strategies, or other expertise
independently developed by The Company personnel, which is a the Company trade secret.
15.3 Responsibilities:
Employees are responsible for protecting corporate information from unauthorized access,
modification, destruction, or disclosure, whether accidental or intentional. To facilitate the
protection of corporate information, employee responsibilities have been established at three
levels: Owner, Custodian, and User.
Owner:a Company manager of a business unit or office where the information is created, or who
is the primary user of the information. Owners are responsible for:
--Identifying the classification level of all corporate information within their organizational unit
– Defining and implementing appropriate safeguards to ensure the confidentiality, integrity, and
availability of the information resource
– Monitoring safeguards to ensure their compliance and report situations of noncompliance
– Authorizing access to those who have a business need for the information
– Removing access from those who no longer have a business need for the information.
Custodian: employees designated by the Owner to be responsible for protecting information by
maintaining safeguards established by the Owner.
• User: employees authorized by the Owner to access information and use the safeguards
established by the Owner.
15.4 Compliance
Company management has the responsibility to:
– Manage corporate information, personnel, and physical property relevant to business
operations, as well as the right to monitor the actual utilization of all corporate assets.
– Ensure that all employees understand their obligation to protect company information.
– Implement security practices and procedures that are consistent with the Company policies and
the value of the asset.
– Note variance from established security practice and for initiating corrective action.
Typical Tier 2 Policies
INTRODUCTION:
Where the Global Policy (Tier 1) is intended to address the broad organization wide issues, the
Topic-Specific Policy is developed to focus on areas of current relevance and concern to the
organization. Management may find it appropriate to issue a policy on how an organization will
approach Internet usage or the use of the company-provided email system. Topic-specific
policies may also be appropriate when new issues arise, such as when implementing a recently
enacted law requiring protection of particular information.
2 ELECTRONIC COMMUNICATIONS:
2.1 Policy:
The Company maintains electronic communication systems (e-mail, voice-mail, video mail, etc.)
to assist in company business both internally and externally. These systems, including the
equipment and the data stored in the system, are and remain the property of The Company.
The Company reserves the right to retrieve and review any messages composed, sent, or
received.
• The Company-provided electronic communication systems are only to be used for
management-approved activities.

2.2 Responsibilities:
Employees should be aware that even when messages are deleted or erased, it may still be
possible to recreate the message; therefore, the ultimate privacy of message control may not be
assured.
• While electronic communication systems may accommodate the use of passwords for security,
this control does not ensure message confidentiality.
• Electronic communication messages are not to be created or sent that may constitute
intimidating, hostile, or offensive material on the basis of race, color, creed, religion, national
origin, age, sex, martial status, lawful alien status, non-job-related physical or mental disability,
veteran status, sexual orientation, or other basis prohibited by law (refer to Employee Standards
of Conduct).
2.3 Compliance:
The Company management will:
• Manage corporate information, personnel, and physical property relevant to business
operations, as well as the right to monitor the actual utilization of all corporate assets.
• Ensure that all employees are aware of their obligation to use electronic communication
systems in an ethical and proper manner.
• Note variances from established security practices and for initiating corrective action.
3 INTERNET SECURITY:
3.1 Policy:
The Company, through the Internet, provides computing resources to its staff to access
information, communicate, retrieve, and disseminate organization- and business-related
information. Use of the public Internet by The Company employees is permitted and encouraged
where such use is suitable for business purposes in a manner that is consistent with the Employee
Standards of Conduct and as part of the normal execution of an employee’s job responsibilities.
3.2 Standards:
1.The use of company-provided access to the Internet is intended exclusively for management-
approved activities.
2. All access to the Internet by employees must be accomplished through the Companyprovided
method. 3. The Company Chief Information Officer (CIO) must approve all publications/content
files not classified as Public in accordance with the Information Classification policy.
4. The Company’s policies regarding Employee Standards of Conduct, Conflict of Interest,
Information Protection, and Information Classification also apply to use of the Internet.
3.3 Responsibilities:
The Company management will:
• Ensure that all employees are aware of this policy.
• Report all security-related incidents to appropriate management upon discovery.
• Ensure that employees review and sign the Internet Usage and Responsibility Statement.
3.4 Compliance:
Employees who fail to comply with this policy will be considered to be in violation of The
Company’s Employee Standards of Conduct and will be subject to appropriate corrective action.
4 INTERNET USAGE AND RESPONSIBILITY STATEMENT:
I,----------------------acknowledge and understand that access to the Internet, as provided by The
Company, is for management-approved use only. This supports The Company policies on
Employee Standards of Conduct and Information Classification, and among other things,
prohibits the downloading of games, viruses, inappropriate materials or picture files, and
unlicensed software from the Internet. I recognize and accept that while accessing the Internet, I
am responsible for maintaining the highest professional and ethical standards, as outlined in the
Company policy on Employee Standards of Conduct. I have read and understand the policies
mentioned above and accept my responsibility to protect The Company’s information and
reputation. Name:--------------------------------------- Date
5 COMPUTER AND NETWORK MANAGEMENT:
5.1 Policy:
Responsibilities and procedures for the management and operation of all computers and
networks are assigned in the following manner:
• Clear, documented operating procedures are prepared for all operational computer systems to
ensure their correct, secure operation.
• Incident management responsibilities and procedures are established to ensure quick, effective,
and orderly response to security incidents.
• Management and execution of certain duties and areas of responsibility are kept separate in
order to reduce opportunities for unauthorized modification or misuse of data or services.
• Development and operational facilities are segregated to reduce the risk of accidental changes
or unauthorized access to operational software and business data.
• The risks posed by the use of an external contractor in the management of computer or network
facilities are identified and appropriate security measures are incorporated into contracts.
5.2 Responsibilities:
• Company IT line management has the responsibility to ensure that the measures listed above
are put in place and carried out effectively.
• The Company information security organization has the responsibility to provide services that
will assist IT line management in implementing and monitoring compliance with these measures.
• All employees who install, operate, or maintain computer and network equipment and systems
are required to comply with this policy.

5.3 Scope:
The Computer and Network Management Security policy applies to all computer and network
equipment and systems owned and operated by The Company.
5.4 Compliance:
Company officers and senior management are required to ensure that internal audit mechanisms
exist to monitor and measure compliance with this policy.
Company IT and, where appropriate, business unit line management have the responsibility to
enforce compliance with this policy.
ANTI-VIRUS POLICY:
6.1 Policy:
Precautions are applied to prevent and detect the introduction of malicious software, and
safeguard the integrity of the software and data. Virus detection and prevention measures and
appropriate user awareness procedures are implemented.
6.2 Scope:
The Anti-Virus policy applies to all Company IT systems and networks.
6.3 Responsibilities:
• Company line management has the responsibility to ensure that the measures listed above are
implemented effectively.
• Company information security organization has the responsibility to provide assistance to line
management in the implementation of this policy.
• All users of Company IT systems and networks are to comply with this policy.
6.4 Compliance:
Company officers and senior management are required to ensure that internal audit mechanisms
exist to monitor and measure compliance with this policy.
Company line management has the responsibility to enforce compliance with this policy.

7 COMPUTER AND NETWORK MANAGEMENT:

7.1 Policy:
To conduct the business of The Company requires that computer systems and networks be
operated in a safe and secure manner. The primary responsibility for this requirement is assigned
to Information Systems. However, every employee is charged with the responsibility to use the
provided services for the purposes intended and to comply with all security requirements.
7.2 Standards:
Responsibilities and procedures for the management and operation of all computers and
networks are assigned in the following manner:
Clear, documented operating procedures are prepared for all operational computer systems to
ensure their correct, secure operation.
• Incident management responsibilities and procedures are established to ensure quick, effective,
and orderly response to security incidents.
• Management and execution of certain duties and areas of responsibility are kept separate in
order to reduce opportunities for unauthorized modification or misuse of data or services.
• Development and operational facilities are segregated to reduce the risk of accidental changes
or unauthorized access to operational software and business data.
• The risks posed by the use of an external contractor in the management of computer or network
facilities are identified and appropriate security measures are incorporated into contracts.
7.3 Responsibilities:
Company IT line management has the responsibility to ensure that the measures listed above are
put in place and carried out effectively
• The Company information security organization has the responsibility to provide services that
will assist IT line management in implementing and monitoring compliance with these measures.
• All employees who install, operate, or maintain computer and network equipment and systems
are required to comply with this policy.
7.4 Scope:
The Computer and Network Management Security policy applies to all computer and network
equipment and systems owned and operated by The Company.
7.5 Compliance:
Company officers and senior management are required to ensure that internal audit mechanisms
exist to monitor and measure compliance with this policy. Company IT and, where appropriate,
business unit line management has the responsibility to enforce compliance with this policy.
8 PERSONNEL SECURITY:
8.1 Policy:
Information security is addressed at the recruitment stage, included in job descriptions and
contracts, and monitored during an individual’s employment. To ensure compliance with policy
objectives:
• Security responsibilities are stated in employee job descriptions.
• Employment applications for jobs that require access to sensitive information are screened. •
Employees are required to sign nondisclosure agreements.
• Users are trained in security procedures and the correct use of IT facilities before they are
granted access to IT facilities. Users are trained in information security policies and procedures,
security requirements, business controls, and the correct use of IT facilities.
• Incidents affecting security are reported through management channels as quickly as possible.
This is accomplished by:

– Formal reporting and incident response procedures that identify action to be taken on receipt of
an incident report
. – Users who are aware that they are required to note and report all observed or suspected
security weaknesses in or threats to systems or services.
– Users who know to note and report to IT support any software that does not function correctly.
8.2 Scope:
The Personnel Security policy applies to all staff hired by The Company after the
implementation of this policy.

8.3 Responsibilities:
• Company line management has the responsibility to ensure that security responsibilities are
stated in employee job descriptions.
• The Human Resources department has the responsibility to ensure that the other measures in
this policy are in place and properly carried out.
• The Information Security department has the responsibility to implement the educational
material called for in this policy.
8.4 Compliance:
Company officers and senior management are required to ensure that internal audit mechanisms
exist to monitor and measure compliance with this policy.
Company line managers have the responsibility to enforce compliance with this policy.
Violations of security policy reflected in The Company’s Employee Discipline policy.
9 SYSTEMS DEVELOPMENT AND MAINTENANCE POLICY:
9.1 Policy:
To ensure that security is built into IT systems, management identified, justified, agrees to, and
documents security requirements during the requirements phase of an IT system development
project.
Security requirements are included in the requirements analysis stage of each system
development project, and requirements for security controls are specified in statements of
business requirements.
Security controls are designed into applications systems to prevent loss, modification, or misuse
of user data. These controls are:
Validation of data input to applications systems to ensure that it is correct and appropriate
• Incorporation of validation checks into systems to detect corruption caused by processing errors
or through deliberate acts
• Consideration of the use of encryption to safeguard the confidentiality and integrity of highly
sensitive data during transmission or in storage
• Consideration of the use of message authentication for applications where it is vital to protect
the integrity of message content from unauthorized changes or corruption.
9.2 Responsibilities:
Company system development and maintenance management has responsibility to ensure that
the measures listed above are put in place and carried out effectively.
• Company information security organization has the responsibility to provide assistance to
system development and maintenance management in the implementation of this policy.
• All employees engaged in systems development and maintenance are required to comply with
this policy.
9.3 Scope:
The Systems Development and Maintenance Security policy applies to all systems development
and maintenance activities carried out by Company activities.
9.4 Compliance:
Company officers and senior management are required to ensure that internal audit mechanisms
exist to monitor and measure compliance with this policy. Company IT line management has the
responsibility to enforce compliance with this policy.
10 APPLICATION ACCESS CONTROL POLICY
10.1 Policy:
To prevent unauthorized access to information held in information systems. Users of application
systems, including support staff, should be provided with access to information and application
systems and that access should be based on individual business application requirements.
10.2 Standards:
Security tools will be used to control access within application systems. Access to software and
information will be allowed only for authorized users. Only the least amount of access to
software and information—necessary to carry out the tasks for which the access is needed—will
be granted. Application systems will:
• Make sure only the information owner and those people and processes authorized by the
information owner have access to the application system.
• Provide protection against using software utilities that bypass the system or application
controls.
• Control the use of other systems with which our information is shared, to change or delete the
information.
10.3 Responsibilities:
Application owners must ensure compliance with this policy. All employees of The Company or
any other organization who access The Company’s applications, plus information owners and
those who maintain and administer security tools are responsible for complying with this policy.

10.4 Scope:
This policy applies to all Company employees—full-time, part-time, or contract—and anyone
doing business with The Company who has access to The Company’s applications.
10.5 Compliance:
Failure to comply with this policy may result in disciplinary action, which may include
termination of employment.
10.6 Supporting Standards:
To be able to enforce this policy, the Company has established standards that include but are not
limited to:
• Information access restriction.
• Use of system utilities .
• Access control to source libraries .
• Sensitive system isolation.
• Data classification .
• Outside application access restriction.
• External user access request (e.g., Energy WAVES) .
• Vendor support of applications.
•Third-party support.
11 DATA AND SOFTWARE EXCHANGE POLICY:
11.1 Policy:
Exchanges of information and software between The Company and any other organization will
be controlled in accordance with its classification. The exchange of information will comply with
any regulatory policies and legal agreements. Exchanges will be carried out only by prior
agreement. Management approval and/or legal contract will be acquired and documented before
information and software exchanges take place.
11.2 Responsibilities:
Company senior management is responsible for enforcement of compliance with this policy. All
employees of The Company or any other organization—plus information owners and those who
maintain and administer security tools—who access The Company’s applications are responsible
for complying with this policy.
11.3 Scope:
This policy applies to all Company employees—full-time, part-time, or contract—or anyone
doing business with The Company who needs electronic access to The Company’s information
and software.
11.4 Compliance:
Failure to comply with this policy may result in disciplinary action, which may include
termination of employment.
11.5 Supporting Standards:
To be able to enforce this policy, The Company has established standards that include but are not
limited to:
•Encryption
• Digital certificates
• E-mail security
• E-business transactions
• FTP • Instant messaging
• EDI data exchange
• Message digest
• Information and software exchange agreements
• Security of media in transit
• Security of electronic office systems
• Publicly available systems
• Other forms of information exchange

12 NETWORK ACCESS CONTROL


12.1 Policy:
Connection to The Company’s network—and services we can access—will be granted when a
comparison of the business need versus the security impact to the entire network says it is
prudent to do so. Network connections to sensitive or critical business applications or users in
high-risk locations must have the prior approval of the owners of the business applications.
Approval for network connections and services will be given only for the minimal access needed
to meet business requirements.
12.2 Responsibilities:
The Information Protection Manager is responsible for the enforcement of this policy. All
employees of The Company or any other organization, plus information owners and those who
maintain and administer security tools, who access The Company’s network are responsible for
complying with this policy.
12.3 Scope:
This policy applies to all Company business units, plus anyone who is doing business with The
Company and who needs access to The Company’s network to do business.
12.4 Compliance:
Failure to comply with this policy may result in disciplinary action, which may include
termination of employment.
12.5 Supporting Standards:
To be able to enforce this policy, the Company has established standards that include but are not
limited to:
Remote access
• Third-party access
• Limited services
• Enforced path
• User authentication
Node authentication
• Remote diagnostic port protection
• Network segregation
• Network connection control
• Network routing control
• Security in network services
• Protection from malicious software
13 NETWORK MANAGEMENT POLICY
13.1 Policy:
Network security standards, procedures, and tools will be established to protect the network and
preserve the confidentiality of the information on every part of the network. Network monitoring
tools and processes will be put in place to detect and react to network failures, external network
probes, and unauthorized network access attempts.
13.2 Responsibilities:
The Network Manager in each business unit is responsible for the enforcement of this policy.
Where a business unit does not have a Network Manager, the person (or unit) who has been
assigned responsibility f or network management for that business unit has this responsibility.
All employees of The Company or any other organization—plus information owners and those
who maintain and administer security tools—who access the Company’s network are responsible
for complying with this policy.
13.3 Scope:
This policy applies to all Company business units, plus anyone who is doing business with The
Company and who needs access to The Company’s network to do business.
13.4 Compliance:
Failure to comply with this policy may result in disciplinary action, which may include
termination of employment.
13.5 Supporting Standards
To be able to enforce this policy, The Company has established standards that include but are not
limited to:
• Firewalls and routers
• Monitoring and IDSs
• 24/7 all-component monitoring
• Remote management capability for key network components.
14 INFORMATION SYSTEMS’ OPERATIONS POLICY
14.1 Policy:
The Company will decide and document—in standards—who has responsibility for the
management and operation of all information-processing systems. The Company will also
document the procedures necessary for operating all information processing systems and those
procedures will include specific requirements for segregation of duties—that will not allow any
single person to control multiple critical systems.
14.2 Responsibilities:
The senior management of The Company is responsible for the enforcement of this policy.
Employees who operate The Company’s computing equipment are responsible for complying
with this policy.
14.3 Scope:
This policy applies to all business units, plus anyone who is doing business with the company
and who needs access to Mega Energy’s information processing systems to do business.
14.4 Compliance:
Failure to comply with this policy may result in disciplinary action, which may include
termination of employment.
14.5 Supporting Standards:
To be able to enforce this policy, The Company has established standards that include but
are not limited to:
• Documented operating procedures
• Operational change control
• Incident management procedures
• Segregation of duties
• Separation of development and operational systems
• External facilities management

15 PHYSICAL AND ENVIRONMENTAL SECURITY


15.1 Policy
Information processing facilities that are critical to The Company’s business will be housed in
secure areas, protected by a defined security perimeter, with security barriers and entry controls.
These controls will be adequate to restrict access to the facilities to authorized people and to
provide control over the disruption of normal business activities.
15.2 Responsibilities:
The senior management of The Company is responsible for the enforcement of this policy. All
employees of The Company or any other organization who access the Company’s information
processing facilities, plus information owners and those who maintain and administer security
tools, are responsible for complying with this policy.
15.3 Scope:
This policy applies to all business units, plus anyone who is doing business with The Company
and who needs access to The Company’s information processing facilities to do business.
15.4 Compliance:
Failure to comply with this policy may result in disciplinary action, which may include
termination of employment.
15.5 Supporting Standards:
To be able to enforce this policy, The Company has established standards that include but are not
limited to:
• Physical security perimeter
• Physical entry controls
• Securing offices, rooms, and facilities
• Working in secure areas
• Isolated delivery and loading areas
• Equipment sitting and protection
• Power supplies
• Cabling security
• Equipment maintenance
• Security of equipment off-premises
• Secure disposal or re-use of equipment
• Clear desk and clear screen policy
• Removal of property
16 USER ACCESS POLICY
16.1 Policy:
Access rights to information and services will be based on the principle of least privilege and
consistent with regulatory guidelines, (e.g., affiliate compliance rules). Access to information
will be granted only in accordance with established standards for the initial registration,
maintenance, and deletion of users’ access. The establishment of the ability to override any of
the above will require the approval of a department manager or a department manager’s
documented designee.
16.2 Responsibilities:
In each business unit, the people who manage computer resources (but no lower than department
manager level) are responsible for ensuring compliance with this policy. All employees of The
Company or any other organization—plus information owners and those who maintain and
administer security tools—who access the Company’s network are responsible for complying
with this policy.
16.3 Scope:
This policy applies to all business units, plus anyone who is doing business with The Company
and who needs access to The Company’s network to do business.
16.4 Compliance:
Failure to comply with this policy may result in disciplinary action, which may include
termination of employment.
16.5 Supporting Standards:
To be able to enforce this policy, The Company has established standards that include but are not
limited to:
Intrusion detection
• Audit standards for user access rights
• Management of access privileges related to job changes
• Administrator access
• Backup and recovery of user access control files
• User registration
• Privilege management
• User password management
• Review of user access rights
17 EMPLOYMENT AGREEMENT
This Employment Agreement, between (the “Company”) and (the “Employee”).
For good consideration, the Company employs the Employee on the following terms
and conditions.
2. Term of Employment. Subject to the provisions for termination set forth below, this
agreement will begin on ----------, 20 -------------- , unless sooner terminated.
3. Salary. The Company shall pay Employee a salary of $ ---------per year, for the
services of the Employee, payable at regular payroll periods.
4. Duties and Position. The Company hires the Employee in the capacity of
. The Employee’s duties may be reasonably modified at the Company’s discretion from time to
time.
5. Employee to Devote Full Time to Company. The Employee will devote full time,
attention, and energies to the business of the Company, and, during this employment,
will not engage in any other business activity, regardless of whether such activity is
pursued for profit, gain, or other pecuniary advantage. Employee is not prohibited
from making personal investments in any other businesses, provided those investments
do not require active involvement in the operation of said companies.
6. Confidentiality of Proprietary Information. Employee agrees, during or after the
term of this employment, not to reveal confidential information or trade secrets to any
person, firm, corporation, or entity. Should Employee reveal or threaten to reveal this
information, the Company shall be entitled to an injunction restraining the Employee
from disclosing same, or from rendering any services to any entity to whom said
information has been or is threatened to be disclosed, the right to secure an injunction
is not exclusive, and the Company may pursue any other remedies it has against the
Employee for a breach or threatened breach of this condition, including the recovery
of damages from the Employee.
7. Reimbursement of Expenses. The Employee may incur reasonable expenses for
furthering the Company’s business, including expenses for entertainment, travel, and
similar items. The Company shall reimburse Employee for all business expenses after
the Employee presents an itemized account of expenditures, pursuant to Company
policy.
8. Vacation. The Employee shall be entitled to a yearly vacation of weeks at full
pay.
9. Disability. If Employee cannot perform the duties because of illness or incapacity for a
period of more than weeks, the compensation otherwise due during said illness
or incapacity will be reduced by ( percent). The Employee’s full compensation will be reinstated
upon return to work. However, if the Employee is absent from work for any reason for a
continuous period of over months, the Company may terminate the Employee’s employment,
and the Company’s obligations under this agreement will cease on that date.
Termination of Agreement. Without cause, the Company may terminate this agreement at any
time upon days’ written notice to the Employee. If the Company requests, the Employee will
continue to perform his or her duties and may be paid his or her regular salary up to the date of
termination. In addition, the Company will pay the Employee on the date of the termination a
severance allowance of $ less taxes and Social Security required to be with-held. Without cause,
the Employee may terminate employment upon days’ written notice to the Company. Employee
may be required to perform his or her duties and will be paid the regular salary to date of
termination but shall not receive severance allowance. Notwithstanding anything to the contrary
contained in this agreement, the Company may terminate the Employee’s employ ment upon
days’ notice to the Employee should any of the following events occur:
The sale of substantially all of the Company’s assets to a single purchaser or group
of associated purchasers
b. The sale, exchange, or other disposition in one transaction of the majority of the
Company’s outstanding corporate shares.
Death Benefit. Should Employee die during the term of employment, the Company shall pay to
Employee’s estate any compensation due through the end of the month in which death occurred.
Restriction on Post Employment Compensation. For a period of ( ) years after the end of
employment, the Employee shall not control, consult to, or be employed by any business similar
to that conducted by the company, either by soliciting any of its accounts or by operating within
Employer’s general trading area.
Assistance in Litigation. Employee shall, upon reasonable notice, furnish such information and
proper assistance to the Company as it may reasonably require in connection with any litigation
in which it is, or may become, a party either during or after employment.
Effect of Prior Agreements. This Agreement supersedes any prior agreement between the
Company or any predecessor of the Company and the Employee, except that this agreement shall
not affect or operate to reduce any benefit or compensation due to the Employee of a kind
elsewhere provided and not expressly provided in this agreement.
Settlement by Arbitration. Any claim or controversy that arises out of or relates to this
agreement, or the breach of it, shall be settled by arbitration in accordance with the rules of the
American Arbitration Association. Judgment upon the award rendered may be entered in any
court with jurisdiction.
Limited Effect of Waiver by Company. Should Company waive breach of any provision of
this agreement by the Employee, that waiver will not operate or be construed as a waiver of
further breach by the Employee.
Severability. If, for any reason, any provision of this agreement is held invalid, all other
provisions of this agreement shall remain in effect. If this agreement is heldinvalid or cannot be
enforced, then to the full extent permitted by law any prior agreement between the Company (or
any predecessor thereof) and the Employee shall be deemed reinstated as if this agreement had
not been executed.
Assumption of Agreement by Company’s Successors and Assign-ees. The Company’s rights
and obligations under this agreement will inure to the benefit and be binding upon the
Company’s successors and assignees.
Oral Modifications Not Binding. This instrument is the entire agreement of the Company and
the Employee. Oral changes have no effect. It may be altered only by a written agreement signed
by the party against whom enforcement of any waiver, change, modification, extension, or
discharge is sought.

You might also like