C.2. Sample Email Security Policy

This section sets forth the Company’s policy on the use of electronic mail (email) for electronic communications.

C.2.9. Administering Email

The Company is responsible for creating and managing an infrastructure that can support the safe and successful delivery of email within the Company and to customers, partners, and others via the Internet.

As part of this architecture, the Company will create means by which it can scan the content of messages to prevent the spread of viruses, worms, Trojan Horses, or other executable items that could pose a threat to the security of the systems and network.

C.2.10. Email Virus Protection

Email that has been found to be infected with a virus, worm,Trojan Horse, or ...

Get Writing Information Security Policies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.