||Oracle Tips by Burleson
Use of Company Resources
Every IT organization must ensure that they have
documented information system policies, procedures, and standards.
These instruments will define acceptable use of company resources,
including an Electronic Use Policy
The Electronic Use Policy
outlines inappropriate use of the company’s technological resources
including excessive access to the internet during work-hours, use of
emails for non-business or other unacceptable purposes, accessing porn
sites, reviewing confidential company and personal information, and so
on. Every employee and especially IT employees must sign an
acknowledgement and acceptance of information system security
policies, procedures, and standards.
The IT manager and the security
department should maintain on file hardcopies of this signed
document. An annual review and reacceptance of the security document
will ensure the currency and validity of the principles. Any violation
of the tenets of the security policies, procedures, and standards
document is a breach of company policies and must be dealt with
The above book excerpt is from:
Firing Computer Professionals
manager Guide for Terminating "With Cause"