0% found this document useful (0 votes)
70 views

IT Policies Overview

The document proposes 5 new IT policies for all employees to address the changing technology landscape and security needs. The policies are: 1) Computer and Technology Use, 2) Electronic Communications, 3) Internet Usage, 4) Information Security, and 5) Information Technology Procurement. Each policy expands on existing policies to establish expectations around acceptable use, monitoring, privacy, business vs personal use, and security controls. If approved, the policies would be enforced through progressive discipline and require developing draft documents, focus group feedback, communication planning, and alignment with HR. The goal is to update policies to reflect how organizations now use technology differently and increased security risks.

Uploaded by

Dan Rainey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views

IT Policies Overview

The document proposes 5 new IT policies for all employees to address the changing technology landscape and security needs. The policies are: 1) Computer and Technology Use, 2) Electronic Communications, 3) Internet Usage, 4) Information Security, and 5) Information Technology Procurement. Each policy expands on existing policies to establish expectations around acceptable use, monitoring, privacy, business vs personal use, and security controls. If approved, the policies would be enforced through progressive discipline and require developing draft documents, focus group feedback, communication planning, and alignment with HR. The goal is to update policies to reflect how organizations now use technology differently and increased security risks.

Uploaded by

Dan Rainey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

WC T

E
I RE

V
I
D
ER S

VV I C E
OE R

S S
E
I
IT
ICY

LNE
POA I

R
T
I AN
D

THE NEED FOR IT POLICIES


In the beginning IT was a back office function
Todays organizations use technology
differently
Consumerization is driving new technology
adoption
There are bad guys everywhere

CURRENT POLICIES
Current DWSD policies
Acceptable Use Policy 2010-1
City of Detroit IT policies
Internet usage
Email usage
Workstation usage

PROPOSING 5 NEW ALL EMPLOYEE IT


POLICIES
1. Computer and Technology Use
2. Electronic Communications
3. Internet Usage
4. Information Security
5. Information Technology Procurement
And a supplemental set of IT policies for
IT, PNSS and any other set of users with
elevated IT privileges

PROPOSED ALL-EMPLOYEE POLICIES


1. Computer and Technology Use
Covers parts of acceptable use policy 2010-1 and
CoD Workstation Usage Policy
Expands acceptable use by:
adding expectations around user monitoring,
protection of technology assets, business use,
information and asset ownership, and user privacy
the application of various controls including those
needed to manage risk, intellectual property,
hardware and software, configurations, physical
security, network access, and backup and recovery

PROPOSED ALL-EMPLOYEE POLICIES


2. Electronic Communications Policy
Covers parts of acceptable use policy 2010-1
and CoD Email Usage Policy
Expands these by:
adding expectations around acceptable use,
user privacy and legal rights including system
access by technical staff, system monitoring,
business vs. personal use and records and
records retention responsibilities.
Establishing responsibilities for contractors and
for texting and instant messaging.

PROPOSED ALL-EMPLOYEE POLICIES


3. Internet Usage Policy
Covers parts of acceptable use policy 2010-1
and CoD Internet Usage Policy
Expands these by:
adding expectations around acceptable use,
user privacy and legal rights, system
monitoring, business vs. personal use and
access to external sites.
Prohibits the creation of unapproved internet
access and the acquisition of unapproved
internet (Cloud) services.

PROPOSED ALL-EMPLOYEE POLICIES


4. Information Security Policy

Covers parts of acceptable use policy 2010-1 CoD


Internet Usage, Workstation Usage and Email Usage
policies
Expands these by:
Establishing an Information Security Program
Requiring access controls on all systems
Creating a Cyber Security incident handling process
Prohibiting possession of unauthorized security
toolsets and establishing technology disposal
standards/processes

PROPOSED ALL-EMPLOYEE POLICIES


5. Information Technology Procurement
Policy
IT hardware, software and services to be
purchased with IT approval and according to IT
standards
New IT hardware, software or services are to be
selected with Information Technology Services
input and approval
Open source, freeware prohibited w/o IT approval
IT Service Providers to contract through
Information Technology Services

IT POLICY ENFORCEMENT
Policy #s 1 4 to be enforced through
Human Resources Policy for Progressive
Discipline
Depending on violation, discipline may
include discharge
Policy #5 is to be enforced via purchasing
processes
Supplemental policies to be enforced
through Human Resources Policy for
Progressive Discipline

NEXT STEPS
Develop draft IT policies
All-employee set of five we discussed today
Supplemental set for IT and PNSS (and any
other set of users with elevated IT privileges)
Establish a project to implement polices
Assemble a focus group for vetting of polices
to organization.
Communication plan & labor input
Alignment with Office of Director and HR
policies

QUESTIONS?

THANK YOU FOR YOUR ATTENTION


TODAY

You might also like