P4 – EXPLAIN THE POLICIES AND GUIDLEINES FOR
MANAGING ORGANISATIONAL ICT SECURITY ISSUES
TYPE OF POLICY: WHAT DOES THE POLICY COVER?
E-Mail It covers what subjects are appropriate
and inappropriate when sending e-mails
in the workplace. It will also restrict
attachments: what types of documents
can be attached, how many can be
attached and what size they should be.
Will cover activities deemed
unacceptable via e-mail such as
stalking, harassment, spamming and
sharing company information with
competing organisations. It will also
dictate how you should manage your
inbox like deleting spam etc.
User Area It covers how an account should be
managed on a large computer network,
in particular systems that have many
users (like schools and offices). It will
also define what users can/cannot
share as well as how much storage
space each user has to store data in.
It will also cover who can approve
account requests (E.g. new
accounts/fixing a glitched account), if
users are allowed to share/have
multiple accounts and how long an
account can remain active before it can
be deactivated for good.
Internet Usage/Access It covers what websites can/can’t be
visited. For example, job-related
research is allowed but playing browser-
based games would be restricted. It will
also restrict certain downloads.
Like the e-mail policy, your company’s
IT department will constantly monitor
what websites you visit at what time and
for how long. This is to ensure worker
productivity and company security.