Total Logistics Consulting Security Policy
Objective: Total Logistics Consulting recognizes that information is an organizational
asset, and Total Logistics Consulting will create security measures and assign
responsibilities to protect this asset from loss, theft, and unauthorized modification
or disclosure. All security measures must conform to established Total Logistics
Consulting policies and applicable federal, state, and local laws.
Scope: Total Logistics Consulting's security measures apply to all organization-owned
information, either physical or electronic. All regular and contract employees must
comply with these security measures.
Responsibilities: Every Total Logistics Consulting employee is responsible for
safeguarding Total Logistics Consulting information and the physical assets that store
this information. Every Total Logistics Consulting employee is also responsible for
using computing resources in an effective, ethical, and lawful manner. The Information
Services (IS) department heads the security committee and maintains Total Logistics
Consulting's security measures. Each department manager will assign one person to be a
member of the security committee. All security measures must be approved by the
committee, the IS manager, and the Total Logistics Consulting Director.
Physical Security: Adequate physical security measures must provide for the protection
of human resources, physical and logical assets, and sensitive applications and data.
Department managers must protect all hardware assigned to their department. The IS
department must protect all hardware not assigned to a particular department.
Network Security: The IS department must assess the risks to Total Logistics Consulting
information from network, remote, and Internet connections and must implement
cost-effective security measures to protect Total Logistics Consulting information. All
users must be granted their own user account on the Total Logistics Consulting network.
Users must select a secure password and must not divulge that password to anyone.
Software Security: Commercial software must be used in accordance with licensing
agreements and copyright law. Noncommercial and personal commercial software should not
be installed on Total Logistics Consulting computers unless approved by the IS
department. In addition, employees should not download software from the Internet
without express permission from the IS department.
Disaster Contingency Plan: Each department must maintain a disaster contingency plan and
submit that plan to the IS department. At a minimum, all Total Logistics Consulting
information must be backed up weekly, and all mission-critical information must be
backed up daily.
Acceptable Use Policy: Total Logistics Consulting information and resources generally
should be used only for business purposes. Incidental personal use is permitted,
providing it does not consume more than a trivial amount of resources and does not
interfere with employee productivity or Total Logistics Consulting business functions.
Employees should not misuse their Internet privileges by downloading large files for
personal use. Any questions about acceptable use will be resolved by the security
committee. The security committee must maintain and frequently update a Total Logistics
Consulting acceptable use policy and distribute this policy to all users.
Security Awareness: Department managers must ensure that all employees in their
department are aware of, have access to, and comply with Total Logistics Consulting's
security measures. The IS department must provide security-awareness training for all
new employees.
Compliance: In the event that a Total Logistics Consulting employee violates any of
Total Logistics Consulting's security measures, Total Logistics Consulting may restrict
that employee's use of computing services, terminate the employee, and/or report the
employee to the appropriate law enforcement agency.
REQUIRED CREDIT: This material has been created with the assistance of Lori Bowen Ayre
for the Infopeople Project [http://www.Infopeople.org/], supported by the U.S. Institute
of Museum and LIBRARY Services under the provisions of the LIBRARY Services and
Technology Act, administered in California by the State Librarian.
|