C.2. Sample Email Security Policy
This section sets forth the Company’s policy on the use of electronic mail (email) for electronic communications.
C.2.9. Administering Email
The Company is responsible for creating and managing an infrastructure that can support the safe and successful delivery of email within the Company and to customers, partners, and others via the Internet.
As part of this architecture, the Company will create means by which it can scan the content of messages to prevent the spread of viruses, worms, Trojan Horses, or other executable items that could pose a threat to the security of the systems and network.
C.2.10. Email Virus Protection
Email that has been found to be infected with a virus, worm,Trojan Horse, or ...
Get Writing Information Security Policies now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.