Acceptable Use Policy
SANS (www.sans.org) provides a wide range of security policies freely available on its website. These policies are based on these publicly available policies. Visiting SANS can complement what you learn from and implement based on this chapter. We will use a fictitious company called Granite Systems and show how it based its policies on those recommended by SANS.
In this policy, the company’s IT security department is known simply as the Corporate Security Team for Granite Systems. Granite Systems and other Granite Systems–specific departments appear in italics throughout the policy; if you want to reuse this policy, you can replace these designations with your own.
The Corporate Security Team’s intentions ...