Data Sec 02
Data Sec 02
This data security policy template contains 7 sections and 9 subsections that can be edited, rewritten,
replaced or adapted to meet the needs of your company. Each section contains a brief instruction, which
you can delete, followed by an example of the text you may wish to include in the section. The table of
contents can be updated to reflect any changes you make in the document. New section headers should be
designated as “Heading 2” (and subsection headers as “Heading 3”) to ensure they are included in the table
of contents when you update it.
The footer in the document contains the i-Sight logo. This is editable and can be replaced with your own
company logo, alternate text or nothing at all.
Password Management
Describe the company’s password management protocol. Explain why you should never write out your
passwords on a piece of paper and leave it in your drawer. Include a reminder to never share passwords
with others.
For example:
Employees are required to use strong, complex passwords that are at least 12 characters long with both uppercase and lowercase
letters, at least one number and at least one special character. All equipment will prompt employees to change their passwords every
90 days. The password cannot be one that has been used before, it cannot be your SIN, your birth date or any other personally
identifying information.
Acceptable Use
Communicate acceptable use of email, internet, social media and company equipment. Create boundaries
and draw the line between acceptable and unacceptable personal use. Provide specific examples of websites
that are not permitted.
For example:
Employees are permitted to use social media for personal reasons on their lunch break or another designated break. Employees that
are identifiable on social media as an employee of the company must include a disclaimer in their bio stating that their views are their
own and do not represent that of the company.