Information Security Policy Template
Information Security Policy Template
Introduction
Information security is a holistic discipline, meaning that its application, or lack thereof, affects all facets
of an organization or enterprise. The goal of the (Company) Information Security Program is to protect
the Confidentiality, Integrity, and Availability of the data employed within the organization while providing
value to the way we conduct business. Protection of the Confidentiality, Integrity, and Availability are
basic principles of information security, and can be defined as:
Confidentiality – Ensuring that information is accessible only to those entities that are
authorized to have access, many times enforced by the classic “need to know” principle.
Integrity – Protecting the accuracy and completeness of information and the methods that
are used to process and manage it.
Availability – Ensuring that information assets (information, systems, facilities, networks, and
computers) are accessible and usable when needed by an authorized entity.
(Company) has recognized that our business information is a critical asset and as such our ability to
manage, control, and protect this asset will have a direct and significant impact on our future success.
This document establishes the framework from which other information security policies may be
developed to ensure that the enterprise can efficiently and effectively manage, control and protect its
business information assets and those information assets entrusted to (Company) by its stakeholders,
partners, customers and other third parties.
The (Company) Information Security Program is built around the information contained within this policy
and its supporting policies.
Purpose
The purpose of the (Company) Information Security Policy is to describe the actions and behaviors
required to ensure that due care is taken to avoid inappropriate risks to (Company), its business partners,
and its stakeholders.
Scope
The (Company) Information Security Policy applies equally to any individual, entity, or process that
interacts with any (Company) Information Resource.
Responsibilities
Executive Management
Ensure that an appropriate risk-based Information Security Program is implemented to
protect the confidentiality, integrity, and availability of all Information Resources collected or
maintained by or on behalf of (Company).
Ensure that information security processes are integrated with strategic and operational
planning processes to secure the organization’s mission.
Ensure adequate information security financial and personnel resources are included in the
budgeting and/or financial planning process.
Ensure that the Security Team is given the necessary authority to secure the Information
Resources under their control within the scope of the (Company) Information Security
Program.
Designate an Information Security Officer and delegate authority to that individual to ensure
compliance with applicable information security requirements.
Ensure that the Information Security Officer, in coordination with the Information Security
Committee, reports annually to Executive Management on the effectiveness of the
(Company) Information Security Program.
General Guidelines:
(Company) maintains and communicates an Information Security Program consisting of topic-
specific policies, standards, procedures and guidelines that:
o Serve to protect the Confidentiality, Integrity, and Availability of the Information
Resources maintained within the organization using administrative, physical and
technical controls.
o Provide value to the way we conduct business and support institutional objectives.
o Comply with all regulatory and legal requirements, including: (adjust as appropriate)
All applicable local laws, regulations, and standards.
Information Security best companys, including ISO 27001 and 27002 and NIST.
Contractual agreements,
The information security program is reviewed no less than annually or upon significant changes
to the information security environment.
Prohibited Activities
Personnel are prohibited from the following activities. The list is not inclusive. Other prohibited activities
are referenced elsewhere in this document.
1) it does not consume more than a trivial amount of employee time or resources,
2) it does not interfere with staff productivity,
3) it does not preempt any business activity,
4) it does not violate any of the following:
a) Copyright violations – This includes the act of pirating software, music, books and/or
videos or the use of pirated software, music, books and/or videos and the illegal
duplication and/or distribution of information and other intellectual property that is
under copyright.
b) Illegal activities – Use of Company information resources for or in support of illegal
purposes as defined by federal, state or local law is strictly prohibited.
c) Commercial use – Use of Company information resources for personal or commercial
profit is strictly prohibited.
d) Political Activities – All political activities are strictly prohibited on Company premises.
The Company encourages all of its employees to vote and to participate in the election
process, but these activities must not be performed using Company assets or resources.
e) Harassment – The Company strives to maintain a workplace free of harassment and that
is sensitive to the diversity of its employees. Therefore, the Company prohibits the use
of computers, e-mail, voice mail, instant messaging, texting and the Internet in ways
that are disruptive, offensive to others, or harmful to morale. For example, the display
or transmission of sexually explicit images, messages, and cartoons is strictly prohibited.
Other examples of misuse include, but is not limited to, ethnic slurs, racial comments,
off-color jokes, or anything that may be construed as harassing, discriminatory,
derogatory, defamatory, threatening or showing disrespect for others.
f) Junk E-mail - All communications using IT resources shall be purposeful and appropriate.
Distributing “junk” mail, such as chain letters, advertisements, or unauthorized
solicitations is prohibited. A chain letter is defined as a letter sent to several persons
with a request that each send copies of the letter to an equal number of persons.
Advertisements offer services from someone else to you. Solicitations are when
someone asks you for something. If you receive any of the above, delete the e-mail
message immediately. Do not forward the e-mail message to anyone.
Personal software shall not be used on Company computers or networks. If a need for specific
software exists, submit a request to your supervisor or department head. Users shall not use
Company purchased software on home or on non-Company computers or equipment.
Company proprietary data, including but not limited to patient information, IT Systems
information, financial information or human resource data, shall not be placed on any
computer that is not the property of the Company without written consent of the respective
supervisor or department head. It is crucial to the Company to protect all data and, in order to
do that effectively we must control the systems in which it is contained. In the event that a
supervisor or department head receives a request to transfer Company data to a non-Company
Computer System, the supervisor or department head should notify the Privacy Officer or
appropriate personnel of the intentions and the need for such a transfer of data.
Confidentiality Agreement
All employees of the company information resources shall sign, as a condition for employment, an
appropriate confidentiality agreement. The agreement shall include the following statement, or a
paraphrase of it:
I understand that any unauthorized use or disclosure of information residing on the Company
information resource systems may result in disciplinary action consistent with the applicable laws and
regulations.
Enforcement
Personnel found to have violated this policy may be subject to disciplinary action, up to and
including termination of employment, and related civil or criminal penalties.
Any vendor, consultant, or contractor found to have violated this policy may be subject to
sanctions up to and including removal of access rights, termination of contract(s), and related
civil or criminal penalties.