These are examples of computer security policies. Some are policies which have been created and implemented by specific organizations, others are simply samples to provide guidance to those writing their own policies. You may like to use these as templates or donor documents for your own, subject to any copyright restrictions on the originals.
More information
More information
Related categories 1
Sites 25
A high level information security policy from Washington University.
An overarching security policy from Berkeley University includes links to more specific and detailed policies.
From the University of North Carolina, Greensboro. Policy on protecting the organization's own intellectual property through copyright.
From the University of North Carolina, Greensboro. Deliberately simple: defines just two classification levels. Includes responsibilities.
Formal policy from the University of California covering email and other electronic communications mechanisms
[PDF]
Policy from the University of Colorado on the use of email and other means of electronic communication for official purposes.
Policy from Northern Illinois University's IT Services group. Outlines some unacceptable uses.
From the University of North Carolina, Greensboro. Policy on compliance with the Health Insurance Portability and Accountability Act.
From Herriot-Watt University. Clarifies the respective roles of students, faculty and administrators in reporting and dealing with information security incidents.
[PDF]
SANS consensus research project offering around 30 editable information security policies.
From the New School university in New York. Includes a set of 21 high level principles, cross-referenced to ISO/IEC 27002:2005.
[PDF]
High-level information security policy statement for the Childhood Cancer Research Group at Oxford University.
One page Acceptable Use Policy example.
[PDF]
Example security policy to demonstrate policy writing techniques introduced in three earlier articles.
Collection of information security policies, procedures etc. aligned with the ISO/IEC 27000-series standards and provided under the Creative Commons license.
Succinct policy from Oregon State University requires that a competent person signs a release form before disposing of storage media from which the data have been securely erased (e.g. by 7x overwrite)
[PDF]
Example policy covering pre-employment screening, security policy training etc.
[PDF]
Google's privacy policy is clearly written.
One of many many examples on the WWW, this one from the School of Graduate Studies at Norwich University.
Policy covering appropriate use of information resources and IT at the University of Michigan.
Sample policy on teleworking covering employment as well as information security issues.
From the University of North Carolina, Greensboro. Covers health and safety and employment issues as well as IT security aspects of home working.
Electronic resource usage and security policies from the University of Pennsylvania.
A set of information security policies from the University of Louisville.
From the University of North Carolina, Greensboro. Prohibits wireless devices that may interfere with authorized wireless systems.
Google's privacy policy is clearly written.
One of many many examples on the WWW, this one from the School of Graduate Studies at Norwich University.
From the University of North Carolina, Greensboro. Deliberately simple: defines just two classification levels. Includes responsibilities.
From the University of North Carolina, Greensboro. Covers health and safety and employment issues as well as IT security aspects of home working.
From the University of North Carolina, Greensboro. Prohibits wireless devices that may interfere with authorized wireless systems.
From the University of North Carolina, Greensboro. Policy on compliance with the Health Insurance Portability and Accountability Act.
From the University of North Carolina, Greensboro. Policy on protecting the organization's own intellectual property through copyright.
Policy from Northern Illinois University's IT Services group. Outlines some unacceptable uses.
Collection of information security policies, procedures etc. aligned with the ISO/IEC 27000-series standards and provided under the Creative Commons license.
Formal policy from the University of California covering email and other electronic communications mechanisms
[PDF]
Policy from the University of Colorado on the use of email and other means of electronic communication for official purposes.
Succinct policy from Oregon State University requires that a competent person signs a release form before disposing of storage media from which the data have been securely erased (e.g. by 7x overwrite)
[PDF]
From Herriot-Watt University. Clarifies the respective roles of students, faculty and administrators in reporting and dealing with information security incidents.
[PDF]
A high level information security policy from Washington University.
From the New School university in New York. Includes a set of 21 high level principles, cross-referenced to ISO/IEC 27002:2005.
[PDF]
Example security policy to demonstrate policy writing techniques introduced in three earlier articles.
Policy covering appropriate use of information resources and IT at the University of Michigan.
High-level information security policy statement for the Childhood Cancer Research Group at Oxford University.
An overarching security policy from Berkeley University includes links to more specific and detailed policies.
SANS consensus research project offering around 30 editable information security policies.
Electronic resource usage and security policies from the University of Pennsylvania.
A set of information security policies from the University of Louisville.
One page Acceptable Use Policy example.
[PDF]
Example policy covering pre-employment screening, security policy training etc.
[PDF]
Sample policy on teleworking covering employment as well as information security issues.
Last update:
May 30, 2023 at 5:35:06 UTC
Check out
Recreation: Pets: Birds: Species: Parrots: African Greys
- Recently edited by cherel
- Recently edited by cherel