Security Basics mailing list archives
Re: Policy Violations
From: "John D" <tornado579 () gmail com>
Date: Tue, 5 May 2009 19:09:34 +0530
Thanks all for your replies. Any resources on the internet which give an idea about what can fit into Class 1,2,3 offenses in terms of policy violations and also what disciplinary actions can be taken for the respective class of offensenses?
Here i am talking about typical senarios in the IT companies. Thanks in advance.----- Original Message ----- From: "s0h0us" <s0h0us () yahoo com>
To: "John D" <tornado579 () gmail com>; <security-basics () securityfocus com> Sent: Monday, May 04, 2009 11:22 PM Subject: Re: Policy Violations
You should have a Sanction Policy in place, that in genral terms, would speak to actions to be taken in the event of violations. Be careful with being to specific. General terms will allow management some flexibility as needed; it really depends on the size of your organization as well. Make sure you get legal council to review and approve this policy.----- Original Message ---- From: John D <tornado579 () gmail com> To: security-basics () securityfocus com Sent: Monday, May 4, 2009 10:13:22 AM Subject: Policy Violations Hi All,I was just wondering about what are the best practices followed in the organiations when it comes to Policy violations. For E.g. Accessing Adult material from the company resources, engaging in malicious activities etc.Your thoughts are welcome. Thanks in advance. ------------------------------------------------------------------------ This list is sponsored by: InfoSec InstituteLearn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class. Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified Penetration Tester exams, taught by an expert with years of real pen testing experience.http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------
------------------------------------------------------------------------ This list is sponsored by: InfoSec InstituteLearn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class. Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified Penetration Tester exams, taught by an expert with years of real pen testing experience.
http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------
Current thread:
- Policy Violations John D (May 04)
- Message not available
- Re: Policy Violations John D (May 05)
- Message not available
- Re: Policy Violations Stephen Mullins (May 11)
- <Possible follow-ups>
- Re: Policy Violations aaa . bbb (May 05)
- Re: Policy Violations aaa . bbb (May 05)
