{"id":3008,"date":"2023-10-14T13:59:56","date_gmt":"2023-10-14T13:59:56","guid":{"rendered":"https:\/\/techcafeteria.com\/new\/?page_id=3008"},"modified":"2025-10-09T13:39:49","modified_gmt":"2025-10-09T13:39:49","slug":"standard-security-policies","status":"publish","type":"page","link":"https:\/\/techcafeteria.com\/?page_id=3008","title":{"rendered":"Standard Security Policies"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3008\" class=\"elementor elementor-3008\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-82b858f e-flex e-con-boxed e-con e-child\" data-id=\"82b858f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5a90190 e-flex e-con-boxed e-con e-child\" data-id=\"5a90190\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-50e39ee9 elementor-widget elementor-widget-text-editor\" data-id=\"50e39ee9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 style=\"text-align: center;\">Standard Security Policies<\/h1>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a040f36 e-flex e-con-boxed e-con e-parent\" data-id=\"a040f36\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aea354c elementor-widget elementor-widget-text-editor\" data-id=\"aea354c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Here are some of the typical policies that any business should have in place to inform staff of the compliance requirements and prepare the organization for dealing with cyber-threats and incidents.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5e34421 e-con-full e-flex e-con e-parent\" data-id=\"5e34421\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-6fdbedd e-con-full e-flex e-con e-child\" data-id=\"6fdbedd\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a0a6c1c elementor-widget elementor-widget-text-editor\" data-id=\"a0a6c1c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 style=\"text-align: center;\">Policy<\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a34649f e-con-full e-flex e-con e-child\" data-id=\"a34649f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-942c968 elementor-widget elementor-widget-text-editor\" data-id=\"942c968\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Description<\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-274d21f e-flex e-con-boxed e-con e-parent\" data-id=\"274d21f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7095d4c e-con-full e-flex e-con e-child\" data-id=\"7095d4c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-24d78cf elementor-widget elementor-widget-text-editor\" data-id=\"24d78cf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Acceptable Use Policy (AUP)<\/h4>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-49a61db e-con-full e-flex e-con e-child\" data-id=\"49a61db\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ed7483 elementor-widget elementor-widget-text-editor\" data-id=\"4ed7483\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-olk-copy-source=\"MessageBody\">Documents the basic guidelines for using the company equipment and software. Typically, the AUP discusses how email and social media should be used, expected treatment of office equipment and policies about what to do when you leave the company, and other general instructions that aren\u2019t detailed more extensively in a specific policy.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d6f4bd3 e-flex e-con-boxed e-con e-parent\" data-id=\"d6f4bd3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2ebd8eb e-con-full e-flex e-con e-child\" data-id=\"2ebd8eb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b11205 elementor-widget elementor-widget-text-editor\" data-id=\"3b11205\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"text-align: center;\">Security Policy<\/h4><p>AKA &#8220;Data Policy&#8221; or &#8220;Acceptable Use Policy&#8221;<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ad9872b e-con-full e-flex e-con e-child\" data-id=\"ad9872b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f6ba46 elementor-widget elementor-widget-text-editor\" data-id=\"1f6ba46\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Instructs staff on how to manage personally identifiable information and protect company resources. This policy outlines how confidential or sensitive materials, digital or physical, should be stored and protected. For digital media, is encryption required when emailing or storing? Should computers be locked when staff are away from their desks? Is it allowable to post passwords on post-its on monitors?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-692d7bd e-flex e-con-boxed e-con e-parent\" data-id=\"692d7bd\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-63f8096 e-con-full e-flex e-con e-child\" data-id=\"63f8096\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4576827 elementor-widget elementor-widget-text-editor\" data-id=\"4576827\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"text-align: center;\">Incident Response Plan<\/h4><p>AKA &#8220;Breach Policy&#8221;<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-34971e8 e-con-full e-flex e-con e-child\" data-id=\"34971e8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2cf9d18 elementor-widget elementor-widget-text-editor\" data-id=\"2cf9d18\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Guides the response to a data breach. Who should be notified? Who should be involved in the response? What timeframes should be followed for reporting to authorities and alerting constituents that have been breached? What follow-up is required? A good incident response plan will include sample communications and be in line with any regulatory requirements that the company is subject to.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-370d121 e-flex e-con-boxed e-con e-parent\" data-id=\"370d121\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-442ecbb e-con-full e-flex e-con e-child\" data-id=\"442ecbb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f9f9ff4 elementor-widget elementor-widget-text-editor\" data-id=\"f9f9ff4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"text-align: center;\">Mobile Device Policy<\/h4><p>AKA &#8220;Remote Computing Policy&#8221;<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d5bb56f e-con-full e-flex e-con e-child\" data-id=\"d5bb56f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c02be7 elementor-widget elementor-widget-text-editor\" data-id=\"7c02be7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Instructs staff on how to protect company information on phones, laptops, tablets, and home computers. It establishes obligations that the employee must comply with if company data is going to be accessed or stored on personally-owned equipment. It includes requirements for securing company-owned equipment, such as what to do should a laptop be lost or stolen and how often the laptop should be brought in for inspection by IT staff; and it outlines the procedures for removing company data when an employee leaves the organization.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-781b899 e-flex e-con-boxed e-con e-parent\" data-id=\"781b899\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1aa404e e-con-full e-flex e-con e-child\" data-id=\"1aa404e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ec77d6 elementor-widget elementor-widget-text-editor\" data-id=\"6ec77d6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"text-align: center;\">Password Policy<\/h4>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc320e2 e-con-full e-flex e-con e-child\" data-id=\"dc320e2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-00b8f95 elementor-widget elementor-widget-text-editor\" data-id=\"00b8f95\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Covers the requirements for accessing company systems. For a long time, the standard security best practices were to require complex passwords (mixing alpha, numeric and special characters with mixed case requirements) with frequent password changes. Over the last five years, the thinking has changed, and authorities on information security such as the <a href=\"https:\/\/www.nist.gov\/\">National Institute of Standards and Technology (NIST)<\/a> have acknowledged that, with too many passwords to memorize and sophisticated tools available for hackers, that advice is out of date. A safer password policy, per NIST, would have these rules:<\/p>\n<p style=\"padding-left: 80px;\">\u2666 A minimum of 15 characters. Spaces are allowed, so users should think of pass phrases, as opposed to pass<em>words<\/em>.<\/p>\n<p style=\"padding-left: 80px;\">\u2666 No complexity required, but common phrases, names, dates with special meaning, and other things that might be researched or guessed by a hacker should not be part of a password.<\/p>\n<p style=\"padding-left: 80px;\">\u2666 No regular password changes, but use a tool or service to monitor for breaches and change passwords promptly when they have been breached. Enterprise software like <a href=\"https:\/\/www.idagent.com\/\">ID Agent<\/a> can be purchased, or free tools like <a href=\"https:\/\/haveibeenpwned.com\/\">HaveIBeenPwned<\/a> can be utilized. Some password managers include breach alerts, such as <a href=\"https:\/\/www.lastpass.com\/\">LastPass<\/a>.<\/p>\n<p>As stressed above, the password policy should actually be a broader authentication policy, and also discuss the requirement for MFA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9c60bec e-flex e-con-boxed e-con e-parent\" data-id=\"9c60bec\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d1f6fde e-con-full e-flex e-con e-child\" data-id=\"d1f6fde\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d0101df elementor-widget elementor-widget-text-editor\" data-id=\"d0101df\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"text-align: center;\">Telecommuting Policy<\/h4><p>AKA &#8220;Work From Home Policy&#8221;<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-24e0944 e-con-full e-flex e-con e-child\" data-id=\"24e0944\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5390d64 elementor-widget elementor-widget-text-editor\" data-id=\"5390d64\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Sets the requirements and expectations for remote work, including expectations around communication; workplace safety (Companies are still liable if employees are injured in a home office); and availability.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-528b7dd e-flex e-con-boxed e-con e-parent\" data-id=\"528b7dd\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-dbc09db e-con-full e-flex e-con e-child\" data-id=\"dbc09db\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-95b8711 elementor-widget elementor-widget-text-editor\" data-id=\"95b8711\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"text-align: center;\">Business Continuity Plan<\/h4><p>AKA &#8220;Disaster Recovery Plan&#8221;<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-da8693f e-con-full e-flex e-con e-child\" data-id=\"da8693f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cdd0cd6 elementor-widget elementor-widget-text-editor\" data-id=\"cdd0cd6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Guides the organization in the case of business disruption. This is more than just an IT plan, although technology is a big piece of it if the company still maintains business-critical in-house servers. A complete business continuity plan includes sections on communication in a disaster and responses to non-disaster but still company-threatening events, such as a major loss of income.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cc657d8 e-flex e-con-boxed e-con e-parent\" data-id=\"cc657d8\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ade2790 e-con-full e-flex e-con e-child\" data-id=\"ade2790\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-32f200b elementor-widget elementor-widget-text-editor\" data-id=\"32f200b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><span data-olk-copy-source=\"MessageBody\">Artificial Intelligence Policy (a.k.a. AI Policy)<\/span><\/h4>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-28eed9a e-con-full e-flex e-con e-child\" data-id=\"28eed9a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61efc6c elementor-widget elementor-widget-text-editor\" data-id=\"61efc6c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-olk-copy-source=\"MessageBody\">Provides guidelines and establishes organizational oversight of AI-generated content. AI tools are subject to numerous legal and ethical issues, including use of copyrighted materials, biased content, and inaccurate content. Organizational oversight should establish training and review requirements.<\/span><\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Standard Security Policies Here are some of the typical policies that any business should have in place to inform staff of the compliance requirements and prepare the organization for dealing with cyber-threats and incidents. Policy Description Acceptable Use Policy (AUP) Documents the basic guidelines for using the company equipment and software. Typically, the AUP discusses<br \/><a class=\"moretag\" href=\"https:\/\/techcafeteria.com\/?page_id=3008\">+ Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":2804,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-3008","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/pages\/3008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3008"}],"version-history":[{"count":10,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/pages\/3008\/revisions"}],"predecessor-version":[{"id":3698,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/pages\/3008\/revisions\/3698"}],"up":[{"embeddable":true,"href":"https:\/\/techcafeteria.com\/index.php?rest_route=\/wp\/v2\/pages\/2804"}],"wp:attachment":[{"href":"https:\/\/techcafeteria.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}