Premium Essay

Information on Company Policies

In:

Submitted By mistyann
Words 855
Pages 4
To: ISAACS, BRANDY From: Misty Ann Powers (ann.m_85@yahoo.com)
Subject: Company Policies
Security Information Policy
By being given access to Electrolux's IT systems you have become part of the team, helping to safeguard our systems and the information they contain. This document is intended to give you an overview of your role, the Group's rules and hopefully a security-minded attitude.

All Electrolux employees and contractors are expected to follow the guidelines set out in the Group's Information Security Framework (ISF). Violation of these rules, or failure to perform responsibilities as defined in the ISF (and summarized here), will be sufficient cause for disciplinary action up to and including termination. In addition to following the ISF, users are expected to be proactive with line management in raising any issue that they feel could compromise the confidentiality, integrity or availability of IT systems or where they suspect a breach of procedure.
If, after reading this, you have any questions please talk to your Line Manager, HR, I.T. Security or your Sector IT Manager. The full text of the ISF can be accessed via E-gate.
ACCESS
Electrolux only authorizes the user to access information, which is needed to perform their job. It is a criminal offense to attempt to gain access to any information system/database for which authority has not been given. Any such attempt will be deemed as an act of gross misconduct, resulting in disciplinary action, up to and including termination.
CONFIDENTIALITY
Information obtained in the course of work for Electrolux is the property of Electrolux or another organization that does business with Electrolux. That information must not be used for personal purposes, including operating a business, selling the information to other parties, or performing analyses of this information on behalf of other parties.

Similar Documents

Premium Essay

Suck This

...Acceptable Use Policy Author: Click and type   Date: Click and type date |Review History | |Name |Department |Role/Position |Date approved |Signature | | | | | | | | | | | | | | | | | | | |Approval History | |Name |Department |Role/Position |Date approved |Signature | | | | | | | | | | | | | | | | | | | Overview The purpose of this policy is to establish acceptable and unacceptable use of electronic devices and network resources at [Company Name] in conjunction with its established culture of ethical and lawful behavior, openness, trust, and integrity. [Company Name] provides computer devices...

Words: 1173 - Pages: 5

Premium Essay

Cmgt-400 Security Policy Importance

...Maintaining Information Security CMGT-400 Assurance and Security 5-25-2013 Maintaining Information Security Maintaining the security of information couldn’t have been said any clearer than by Lindsey Walker of InfoSec Island, when in 2010 she wrote an article about sensitive information becoming breached. She said “Preventing information security breaches needs to become a main priority for any company when handling both customer and company information”. Sharing information has become much easier than in previous years, from the widespread mainstream use of USB thumb drives or the constant urge to share some secret news or research on Twitter and other social media. The need for a company to constantly review and update their information security policy periodically has never been greater than now. Security Policy An Information security policy should be written in a way that defines how digital information should be protected and accessed by all company employees. Most information that is used to define the Information Security Policy can be gathered by first running a risk analysis report. These reports look at your business model and create a data structure that can be used to inform a company about where their greatest risks are within the company and around the entire work place. Certain “must-have” check boxes for items that should be included in an information security policy are Acceptable Use Policy, Wireless Policy, Email Policy, and Encryption Policy. These...

Words: 1928 - Pages: 8

Premium Essay

Abut Stack

...Acceptable Use Policy Author: Click and type   Date: Click and type date |Review History | |Name |Department |Role/Position |Date approved |Signature | | | | | | | | | | | | | | | | | | | |Approval History | |Name |Department |Role/Position |Date approved |Signature | | | | | | | | | | | | | | | | | | | Overview The purpose of this policy is to establish acceptable and unacceptable use of electronic devices and network resources at [Company Name] in conjunction with its established culture of ethical and lawful behavior, openness, trust, and integrity. [Company Name] provides computer devices...

Words: 1173 - Pages: 5

Free Essay

Data Retention Policy

... | |DATA RETENTION POLICY | |Revision 2.0 | | | | | | | | | Table of Contents 1.0 Overview: Page 3 2.0 Purpose: Page 3 3.0 Scope: Page 4 4.0 Document Covered by this Policy ...

Words: 2952 - Pages: 12

Premium Essay

It 244 Week 1

...each assignment, you build the sections of an Information Security Policy. Final Project Timeline You should budget your time wisely and work on your project throughout the course. As outlined below, the assignments in the course are designed to assist you in creating your final project Information Security Policy. If you complete your course activities and use the feedback provided by the instructor, you will be on the right track to successfully complete your final project of creating an Information Security Policy. □ Week One: Introduction Review the two company profiles provided in your syllabus and select the one you will use for your final project company. You design the Information Security Policy for this company throughout the course. Once you have decided which company you are using, it may not be changed; therefore, considerable thought should be put into this decision. Next, decide which type of information security policy—program-level, program-framework, issue-specific, or system-specific—is appropriate for your final project company. Assignment: Final Project Information Security Policy: Introduction Complete and submit Appendix C. Note. Section 1 Introduction of Appendix C corresponds to Section 2 of Appendix B in the final compilation due in Week Nine. In completing Appendix C, provide an overview of your final project company, describe the type of security policy that is appropriate for your scenario, and explain...

Words: 899 - Pages: 4

Premium Essay

Best Ever

...Salix Pharmaceuticals Security Policy Introduction The Salix Pharmaceuticals Security Policy Template is for the use of creating a strong security policy. Each sub policy contains a title with a description and a brief summary of what the certain section will contain. The purpose of the security policies is to ensure that Salix Pharmaceuticals is safe and under strong commands. The Salix Pharmaceutical Security Policy should be reviewed when new materials and changes are to be preceded amongst this company. Scope Salix Pharmaceuticals security policy will keep the company running for years if followed by the procedures. Following the sub policies will lead to a successful company that will be ran smooth and processed like no other company. Antivirus, encryption, passwords, and backups will protect this company like no other before. Purpose Salix purpose for the security template is to have the company, employees, managers, assistant manager, and volunteer’s, and temporary follow all these policies to make the company operate under a easy and fast pace. By making this policy the company should be protected from several things and kept up to date on every policy. Employees should obey this policy and read over every so often in case changes and updates are needed to be added. Acceptable Use Workers must report any signs of violation and a misunderstanding of the policies. Workers are not allowed to access any information they do not have the authority to look...

Words: 1087 - Pages: 5

Free Essay

U06A1 - Researching and Reviewing Privacy Policies

...however third party companies that work with the institution, and of our competitors, that offer academic transcript delivery services. Docufide, an affiliation of Parchment Inc., serves as the transcript delivery service for City Colleges of Chicago where I work as a Registrar. The college used for comparison is Kankakee Community College who uses National Clearing House as the delivery service of transcript requests. While researching the privacy policies of Docufide and National Clearing House as I target how they compare and how they use the customer (students’) information they collect, I found that both include four major issues that relate to the “Fair Information Principles”. Both policies give notice of the information practices before collecting data. The choice is given on how the information will be collected and if the information can be used. Both Docufide and National Clearing House give access to their consumers to contest accuracy and completeness of data collected about them and lastly both companies take “reasonable steps” to assure the customers that the information is secure from unauthorized use. Both policies are explicit to the fact that they will not “sell, rent, provide or otherwise share individual information generated…” from the use of the site or setting up an account with the companies’ site; except for the instances they disclosed in the policy. Both of the companies on some instances within the policies will use personal information collected to send...

Words: 855 - Pages: 4

Premium Essay

Information Systems Security Policy

...Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 ________________________________________________________________________ 1 MICROS Systems, Inc. Enterprise Information Security Policy Version 8.0 Public Table of Contents Overview – Enterprise Information Security Policy/Standards: I. Information Security Policy/Standards – Preface……………....5 I.1 Purpose …………….……………………………………………...5 I.2 Security Policy Architecture ………………….………………….6 I.3 Relation to MICROS Systems, Inc. Policies……………………..6 I.4 Interpretation………………………………………………….…..7 I.5 Violations…………………………………………………….….....7 I.6 Enforcement…………………………………………….................7 I.7 Ownership………………………………………………................7 I.8 Revisions…………………………………………………………..7 II. Information Security Policy - Statement………………………..8 MICROS Enterprise Information Security Policy (MEIP): 1. Information Security Organization Policy (MEIP-001)...……....9 2. Access Management Policy (MEIP-002)…………………………10 3. Systems Security Policy (MEIP-003)...…….…………………......11 4. Network Security Policy (MEIP-004)…………………………….12 ________________________________________________________________________ 2 MICROS Systems, Inc. Enterprise Information Security Policy Version 8.0 Public 5. Application Security Policy (MEIP-005)…..………………………13 6. Data Security/Management Policy (MEIP-006)……………….14-15 7. Security Incident Handling Policy (MEIP-007)..………………...

Words: 4971 - Pages: 20

Premium Essay

E-Mail, Internet and Privacy Policies

...INTERNET, AND PRIVACY POLICIES E-Mail, Internet and Privacy Policies University of Phoenix Com 285: Introduction to Business Communication Group: MEBSB039 May 5, 2009 E-Mail, Internet and Privacy Policies With the invention of the internet, many conveniences have been developed to help companies run more efficient. E-Mail was developed to replace standard written messages. This form of communication sped up the receipt of messages from one person to another. Internet and e-mail have become, and will remain a necessary tool for the modern business to succeed. The internet is also used as a way to communicate globally. For instance, a company with offices in the United States and the United Kingdom, now has the ability communicate information at the speed of light. With the advancement of modern technology comes the advancement of ways to steal information and violate the privacy of an employee or the company. Companies have put privacy policies in place to protect employees and the company. Information that could be misused and potentially harm the employee or put the company at risk could easily be sent over the internet through unsecured means. This paper is meant to discuss e-mail, internet use, and privacy policies at the place of employment of the writer. Secondly, we will discuss the laws put in place to regulate employee’s e-mail and internet policies. Thirdly, we will discuss the reasons companies implement e-mail and...

Words: 972 - Pages: 4

Premium Essay

Cis 550 Case Study 7 Stratified Custom Manufacturing, Part 7d

...court procedures for civil lawsuits. The first major revisions, made in 2006, make clear that electronically stored information is discoverable, and they detail what, how and when electronic data must be produced. As a result, companies must know what data they are storing and where it is; they need policies in place to manage electronic data; they need to follow these policies; and they need to be able to prove compliance with these policies, in order to avoid unfavorable rulings resulting from failing to produce data that is relevant to a case.” (Staff) To Read/Download Complete Assignment Hit Purchase Button CIS 550 Case Study 7 Stratified Custom Manufacturing, Part 7D https://hwguiders.com/downloads/cis-550-case-study-7-stratified-custom-manufacturing-part-7d/ SCM appeared to be in direct violation of “Federal Rules of Civil Procedure (FRCP) What it covers: In place since 1938, the FRCP discovery rules govern court procedures for civil lawsuits. The first major revisions, made in 2006, make clear that electronically stored information is discoverable, and they detail what, how and when electronic data must be produced. As a result, companies must know what data they are storing and where it is; they need policies in place to manage electronic data; they need to follow these policies; and they need to be able to prove compliance with these policies, in order to avoid unfavorable rulings resulting from failing to produce data that is relevant to a case.” (Staff) ...

Words: 4832 - Pages: 20

Free Essay

Facebook 2012

...conduct their service, the company continuously collects enormous amounts of personal and non-personal information then distributes it throughout Facebook and Facebook affiliated sites. This is great because it helps individuals in their searching process, creates exposure to ads for products and services that individuals actually want to purchase, allows for people to remain connected and in the know, etc. However, this paper is going to delve deeper into what Facebook’s privacy and security policies include, what kind of user information is being collected, and how it is being used Formally known Privacy Policy: Revised on September 23rd, 2011 and again on March 15th, 2012, the privacy policy is now referred to as the Data Use Policy which supposedly makes it easier for users to understand the terms and condition. Moreover, Facebook is constantly updating the new Data Use Policy with the last update being on May 11th, 2012. The last updates were in reference to the Privacy section of the policy where it better explains “how it uses technologies such as cookies to deliver ads” and how Facebook has “given itself more leeway on how long it keeps information it collects”. What the policy is saying is Facebook and other companies Facebook sells personal user information to will use any technology available to advertise and that Facebook will use personal user information until it is no longer relevant or needed. Moreover, what the change in the policy is also conveying is in...

Words: 1339 - Pages: 6

Premium Essay

Privacy Act

...Cloud Computing Providers Privacy Policy Overview Cloud computing providers offer services such as storage, servers, networks, etc. Cloud computing providers (Google, Distil Networks, Cloud Sigma, etc.) have been known to distribute their customer’s information to third party purchasers without properly informing them. It is imperative that the customer’s privacy is being respected to the highest standard, if not these providers chance losing customers. To prevent this from happening within the future, a policy has been created that put in place standards for these cloud computing companies to abide by. Purpose The purpose of this policy is to define standards by which the various cloud providers must adhere to in regards to the distribution of customer information. These standards have been implemented to ensure that the customer’s privacy is secured. They have also been created to assure that the various companies no longer have their services used in an unethical manner by the customers. Lastly, the policy has been created to limit the information that can be distributed to third party buyers, and furthermore limit their use of the information. Scope/Responsibilities The stakeholders that this policy applies to are the following: * The cloud provider’s staff, which have the responsibility of upholding the policy to the fullest extent. Not only does their position depend on it, but so does the reputation of the organization. * The customers also have to abide...

Words: 911 - Pages: 4

Premium Essay

Econ

...BEHAVIoR We uphold the highest ethical standards and are accountable for all we do. .................................5 Antitrust and Competition .............................................5 Anti-corruption and Bribery ..........................................6 Gifts .....................................................................................7 Integrity of Commercial Transactions ..........................7 International Trade Laws ................................................7 We are good citizens, protect employee health and safety, and manage natural resources responsibly. .......................................................8 Our Expectations in Doing Business ...........................14 Competitive Information ..............................................14 SECtIon III oUR CULtURE We treat each other with dignity and respect, and believe in diversity of thought, culture and background. ...............................................16 Our Responsibilities to Each Other ............................16 We believe helping people grow is everyone’s responsibility. ...............................................17 We set stretch objectives and embrace change. .......18 Public Affairs ......................................................................8 Political Activities .......................................................8...

Words: 8938 - Pages: 36

Premium Essay

Google Case Study

...advancement in technology is faster than what was expected. It can also be observed that the technologies invented have contributed substantial improvements in the society as this made the lives of the people easier and better. However, it cannot be denied that it has a negative side that outweighs some of its benefits. In relation to the privacy issue mentioned above, these technological advancements create threats, specifically to the preservation of its users’ privacy. The rapid increase in the number of users can be associated with the increase of information flow globally and this heightens the risks associated with the use of such technologies. In an instance, the ease in data storage and data sharing that these new technologies offer can be used as a means in invading someone’s personal information. Furthermore, the internet, which is now considered as the latest thing about technological innovation, provides unlimited amount of information to the...

Words: 2705 - Pages: 11

Premium Essay

Network Security

...this exploitation, companies subject themselves to lawsuits from their own customers. These companies often are ignorant of the simple fact that they have been exploited until customers report the issues to these companies and corporations. Many times, more than thirty days goes by before someone alerts the company of a possible security breech. Cost of an electronic exploit can be greater than a million dollars per incident as reported by the FBI. This information is found in the FBI’s (Federal Bureau of Investigation) report of cyber threats in the United States. In order to help counterbalance this, smaller to midsized companies could spend less than $5,000 to harden their systems and operating systems to put a statefull firewall in place. As stated in this paper, these companies often lack the resources, materials and funds to do so. With the FBI report showing reported incidents, there are thousands of incidents that go unreported. Often these incidents are yet to be discovered. With this number of small to mid-size corporations ignoring or slowly implementing security measures, more and more electronic computer crimes are beginning to take place throughout the U.S. With extortion now moving into the digital age, many corporations do not report intrusions to law enforcement in order to avoid negative publicity. Reports of an intrusion could directly have a negative effect on the company’s sales and position in a global competitive market. Approximately 35% of...

Words: 2166 - Pages: 9