O'Reilly logo

Writing Information Security Policies by Scott Barman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Administration of Email

What your organization does with its handling of email is just as important as your users’ usage of the system. The policies and procedures that are put into place can become subjects of lawsuits, grievances, or other procedures that could embarrass the organization or the users.

The ramifications that come from email, whether it is content or how it is handled, do not appear to be taken seriously. This is a real concern because of the high-profile cases and security problems with email. Email policies should promote appropriate due diligence for both the user and administrator.

As you might have noticed, this section assumes that your organization manages its own email services. If your organization outsources its ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required