You are on page 1of 4

Write Your Computer & IT Policies & Procedures Faster

The Computer and Network Policy, Procedures and Forms Manual discusses strategic IT management, control of computer and network assets, and includes a section on creating your own information systems manual along with a computer and IT security guide. The Computer & Network Manual helps you comply with Sarbanes Oxley, COBIT or ISO 17799 security and control requirements. This Computer and Network Manual allows IT Managers, IT departments and IT executives to develop their own unique IT policy and procedures 40 Prewritten Policies and Procedures
1. Information Technology Management IT Records Management IT Document Management IT Device Naming Conventions TCP/IP Implementation Standards Network Infrastructure Standards Computer and Internet Usage Policy E-Mail Policy IT Outsourcing IT Department Satisfaction IT Asset Standards PIT Asset Management IT Vendor Selection IT Asset Assessment IT Asset Installation Satisfaction IT System Administration IT Support Center IT Server / Network Support IT Troubleshooting IT User-Staff Training Plan 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. IT Threat And Risk Assessment IT Security Plan IT Media Storage IT Disaster Recovery Computer Malware IT Access Control IT Security Audits IT Incident Handling IT Project Definition IT Project Management Systems Analysis Software Design Software Programming Software Documentation Software Testing Design Changes During Development Software Releases and Updates Software Support Software Consulting Services Software Training

Computer & Network Procedures To Manage IT Systems


US$ 595.00 Includes seven (7) modules: 1. Introduction and Table of Contents 2. Guide to preparing a well written manual 3. A Sample Manual covering common requirements and practices 4. 40 Policies and 30 corresponding forms 5. Software Development Supplement 6. IT Security Guide 7. Complete Index Choose your delivery option: Hard Cover Book plus CD containing all documents in editable Microsoft Word format and instant download or Instant download only (no shipping)

2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20.

30 Forms and Records


1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. Information Technology Plan IT Plan Review Checklist Records Classification and Retention Guide Records Management Database Document Control List Document Change Request Form Document Change Control Form Network Infrastructure Standards List Company E-Mail Policy Acknowledgement IT Outsourcer Due Diligence Checklist IT Outsourcer Record IT Post-Service Satisfaction Report User Satisfaction Survey IT Asset Standards List 15. IT Asset Configuration Worksheet 16. IT Asset Standards Exception Request 17. IT Asset Requisition/Disposal Form 18. IT Asset Acquisition List 19. Tech Support Receiving Log 20. Nonconforming IT Asset Form 21. IT Asset Inventory Database 22. IT Network Map 23. IT Vendor Notification Form 24. IT Vendor Survey 25. Approved IT Vendor Data Sheet 26. IT Vendor List 27. IT Vendor Disqualification Form 28. IT Asset Assessment Checklist 29. IT Asset Scan Summary 30. IT Asset Installation Follow-Up Report

Have questions? Email: sales@bizmanualz.com


How to Order: Online: www.bizmanualz.com By Phone: 3134-863-5079 800-466-9953 By Fax: 314-863-6571

Computer & Network Policies, Procedures and Forms

www.bizmanualz.com

Document ID ITAD-107 -1

Title COMPANY COMPUTER AND INTERNET USAGE POLICY Revision Prepared By 0.0 (name, title) Effective Date Reviewed By mm/dd/yyyy (name, title) Approved By (name, title) Applicable Standard: None

Print Date mm/dd/yyyy Date Prepared mm/dd/yyyy Date Reviewed mm/dd/yyyy Date Approved mm/dd/yyyy

1.0

ACCEPTABLE USE - COMPUTERS AND INTERNET


Access to the Internet is specifically limited to activities in direct support of official Company business. In addition to access in support of specific work related duties, the Company Internet connection may be used for educational and research purposes. If any user has a question of what constitutes acceptable use he/she should check with their supervisor for additional guidance. Management or supervisory personnel shall consult with the Information Services Manager for clarification of these guidelines.

2.0

INAPPROPRIATE USE - COMPUTERS AND INTERNET


Internet access shall not be for any illegal or unlawful purpose. Examples of this are the transmission of violent, threatening, defrauding, pornographic, obscene, or otherwise illegal or unlawful materials Use of Company e-mail or other messaging services shall be used for the conduct of Company business only. These services shall not be used to harass, intimidate or otherwise annoy another person. The Internet shall not be accessed for private, recreational, or any non-companyrelated activity. The Companys intranet or Internet connections shall not be used for commercial or political purposes. Employees shall not use Company network for personal gain such as selling access of a Company user login ID. Internet access through the Company network shall not be for or by performing unauthorized work for profit. Users shall not attempt to circumvent or subvert security measures on either the Companys network resources or any other system connected to or accessible through the Internet. Company employees shall not use Internet access for interception of network traffic for any purpose other than engaging in authorized network administration.

Sample Procedure

Page 2 of 4

Computer & Network Policies, Procedures and Forms

www.bizmanualz.com

Company users shall not make or use illegal copies of copyrighted material, store such material on Company equipment, or transmit such material over the Company network.

3.0

INTERNET AND E-MAIL ETIQUETTE


Company employees shall ensure all communication through Company e-mail or messaging services is conducted in a professional manner. The use of suggestive, vulgar, or obscene language is prohibited. Company users shall not reveal private or personal information through e-mail or messaging services without clear and specific written approval from management. Users should ensure that e-mail messages are sent to only those users with a specific need to know. The transmission of e-mail to large groups, use of e-mail distribution lists, or sending messages with large file attachments (attachments larger than 0.5 Mb) should be avoided. E-mail privacy cannot be guaranteed. For security reasons, messages transmitted through the Company e-mail system or network infrastructure are the property of the Company and are, therefore, subject to inspection.

4.0

COMPUTER AND INTERNET USAGE - SECURITY


Company users who identify or perceive an actual or suspected security problem shall immediately contact the IT Security Manager, in accordance with procedure ITSD108 IT INCIDENT HANDLING. Network users shall not reveal their account passwords to others or allow any other person, employee or not, to use their accounts. Similarly, users shall not use other employees accounts. Any and all use of IT assets is subject to monitoring by IT Security. Access to Company network resources shall be revoked for any user identified as a security risk or who has a demonstrated history of security problems.

5.0

COMPUTER AND INTERNET USAGE - PENALTIES ANY USER VIOLATING THESE POLICIES OR APPLICABLE LOCAL, STATE, OR FEDERAL LAWS WHILE USING THE COMPANY NETWORK SHALL BE SUBJECT TO LOSS OF NETWORK PRIVILEGES AND ANY OTHER DISCIPLINARY ACTIONS DEEMED APPROPRIATE, POSSIBLY INCLUDING TERMINATION AND CRIMINAL AND/OR CIVIL PROSECUTION.

6.0

COMPUTER AND INTERNET USAGE - CONCLUSION


All terms and conditions as stated in this document are applicable to all users of the Company network and the Internet. These reflect an agreement of all parties and should be governed and interpreted in accordance with the laws of <State>.

Sample Procedure

Page 3 of 4

Computer & Network Policies, Procedures and Forms

www.bizmanualz.com

7.0

USER COMPLIANCE
I understand and will abide by the Company computer, network, and Internet use policies. I further understand that any violation of this policy is considered unethical and may constitute a criminal offense. Should I commit any violation, my access privileges may be revoked and disciplinary action and/or appropriate legal actions may be taken.

User Signature ________________________________ Date ____________

Sample Procedure

Page 4 of 4

You might also like