Title: RE: Acceptable Use/Security Policies

Try looking for a book called "Information Security Management" by Tipton / Krauss.

It has some great sections on just how to develop these policies.


Andy Lemke, CISSP
Voice: (516) 222-3021 Fax: (516) 222-6667


-----Original Message-----
From: Holt, Greg [mailto:[EMAIL PROTECTED]]
Sent: Thursday, September 20, 2001 3:23 PM
To: '[EMAIL PROTECTED]'
Subject: Acceptable Use/Security Policies


New Guy Here
I've recently taken over as the LAN administrator for my company. I am
looking for ideas on setting up proper Acceptable Use and Security Policies
Can anyone point me to some examples of Enterprise Acceptable Use Policies
and Security Policies?
Thanks in advance.
Shaggy
_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls


The sender believes that this E-mail and any attachments were free of any virus, worm, Trojan horse, and/or malicious code when sent. This message and its attachments could have been infected during transmission. By reading the message and opening any attachments, the recipient accepts full responsibility for taking protective and remedial action about viruses and other defects. The sender's employer is not liable for any loss or damage arising in any way from this message or its attachments.

Reply via email to