The NCSA Guide to PC & LAN Security


Stephen Cobb, CISSP

Appendix C: Computer Security Policy

Some security policy links:

Datamation article on security policy and the importance thereof.

Georgia Institute of Technology COMPUTER AND NETWORK USAGE POLICY. Good example of the sort of policy doucments you can now find on the Internet: We quote: "This document constitutes an Institute-wide policy intended to allow for the proper use of all Georgia Tech computing and network resources, effective protection of individual users, equitable access, and proper management of those resources. This should be taken in the broadest possible sense. This policy applies to Georgia Tech network usage even in situations where it would not apply to the computer(s) in use. These guidelines are intended to supplement, not replace, all existing laws, regulations, agreements, and contracts which currently apply to these services."

Here's a policy example from the U.S. government: Automated Information System Security 270 FW 7.1. The purpose of this chapter is to promulgate Service policy necessary to ensure an appropriate level of security for all automated information systems within the U.S. Fish and Wildlife Service (Service).

The Story So Far

  • No typos or errors reported so far.
  • More links and supplemental info being prepared.
  • Check back in 10 days for more links and info.

Table of Contents with Links to Chapters

[Top of Page] [PC LAN Security Home Page] [Table of Contents]


This page updated by Stephen Cobb, Summer 2002 © Copyright, 1996-2002, Stephen Cobb