Requirement:
Acceptable use policy of information and technology assets must be defined, documented and approved.
Control Implementation Guidelines:
- Develop acceptable use policy for information and technology assets of the organization, which may include the following
- Set of specific regulations for access to and use of assets
- A set of clear examples of unacceptable use
- Consequences if defined rules of acceptable use of assets are breached
- The method used to monitor adherence to the defined rules of acceptable use of the organization's information and technology assets
- Acceptable use policy of the organization's information and technology assets must be communicated to all employees and stakeholders in the organization through, including but not limited to the official email or through the organization's website
- Support the organization's policy by the Executive Management. This must be done through the approval of the organization head or his/her deputy
Relevant Cybersecurity Tools:
- Asset Acceptable Use Policy Template
Expected Deliverables:
- Approved policy that covers the requirements for acceptable use of the organization's information and technology assets (e.g., electronic copy or official hard copy)
- Acceptable use policy of the organization's information and technology assets must be communicated to all employees and stakeholders in the organization through, including but not limited to the official email or through the organization's website. Evidence that all employees and stakeholders are aware and informed must be provided
- Formal approval by the head of the organization or his/her deputy on the policy (e.g., via the organization's official e-mail, paper or electronic signature)
Quick & Simple
Discover Our Cybersecurity Compliance Solutions:
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you