INFORMATION MANAGEMENT NETWORK USAGE POLICY

Protecting the information management system from outside intrusion is an absolute necessity today. Most businesses understand this and integrate protection software into their servers. Many fall short, however, when it comes to implementing a network usage policy that provides guidance on both the use of the business’s network or the requirements for handling business data (in any form). The business is protected from outside attacks but not from inside attacks from authorized users (like disgruntled employees).

A network usage policy should cover all forms of media including thumb drives, iPods, and personal cell phones that may be connected to the network. All of these devices come with a large storage ...

Get Operations Due Diligence: An M&A Guide for Investors and Business now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.