Download Network Protection and Information Security Policy for Free

(4.7 based on 139 votes)
Approved 12/14/11 last updated September 14, 2012
NETWORK PROTECTION INTERNAL USE ONLY Page 1
Network Protection and Information Security Policy
Purpose ..................................................................................................................................... 1
Scope ........................................................................................................................................ 1
Policy ......................................................................................................................................... 1
Responsibilities .......................................................................................................................... 2
System Access Control .............................................................................................................. 2
System Privileges ...................................................................................................................... 4
Establishment Of Access Paths ................................................................................................. 6
Computer Viruses, Worms, And Trojan Horses .......................................................................... 7
Data And Program Backup......................................................................................................... 8
Portable Computers ................................................................................................................... 8
Remote Printing ......................................................................................................................... 8
Privacy ....................................................................................................................................... 9
Logs And Other Systems Security Tools .................................................................................... 9
Handling Network Security Information .....................................................................................10
Information Security ..................................................................................................................10
Physical Security Of Computer And Communications Gear ......................................................11
Exceptions ................................................................................................................................12
Violations ..................................................................................................................................12
Terms and Definitions ...............................................................................................................12
Related Documents ..................................................................................................................15
PURPOSE
The purpose of this policy is to establish administrative direction, procedural requirements, and
technical guidance to ensure the appropriate protection of Texas Wesleyan information handled
by computer networks.
SCOPE
This policy applies to all who access Texas Wesleyan computer networks. Throughout this
policy, the word “user” will be used to collectively refer to all such individuals. The policy also
applies to all computer and data communication systems owned by or administered by Texas
Wesleyan or its partners.
POLICY
All information traveling over Texas Wesleyan computer networks that has not been specifically
identified as the property of other parties will be treated as though it is a Texas Wesleyan asset.
It is the policy of Texas Wesleyan to prohibit unauthorized access, disclosure, duplication,
modification, diversion, destruction, loss, misuse, or theft of this information. In addition, it is the
policy of Texas Wesleyan to protect information belonging to third parties that have been
entrusted to Texas Wesleyan in a manner consistent with its sensitivity and in accordance with
all applicable agreements.
Network Protection and Information Security Policy
 1 / 15 >