SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
2/29/2016 Email Policies: Tools to Govern Usage, Access and Etiquette - IT-Toolkits.org
http://it-toolkits.org/blog/?p=72 1/3
Email Policies: Tools to Govern Usage, Access and
Etiquette - IT-Toolkits.org
Email is a fast, easy and readily accessible means of business communication. It has changed the
way we communicate. These are the obvious rewards – but they are also the basis of every risk.
Whenever email content is ill-advised, inappropriate, or even gets into the wrong hands, negative
consequences can follow, including legal liability, regulatory penalties, confidentiality breaches,
damage to corporate reputation, public embarrassment, internal conflicts, and all the related losses in
productivity and performance that these circumstances can cause. Further, data loss and damage to
technology assets can be realized through the transmission of malicious code, spam and computer
viruses.
Perform the “What-if” Analysis: What are the risks to my organization of email abuse and/or
misuse, and what are the likely consequences if these risks are not properly addressed? The next
step is to weigh the costs and complications of all mitigating actions, and to then strike an
appropriate balance between risk and probability.
To eliminate email usage is impractical and even unthinkable – so the goal has to be to minimize the
risks through the best means possible – and that is through the use of physical security precautions
and practical, relevant and enforceable email policy. To realize all of the intended goals and
objectives, related policies (which will integrate closely with data security and internet usage policies)
must encompass four (4) key governance needs:
1. Email Usage: To determine the circumstances under which email can and will be used within a
given organization, whether there will be any limits and/or restrictions on the types of information
that can be transmitted via email, as well as any limits and/or restrictions on the use of business
email systems for personal communications.
2. Email Oversight: To establish that emails are official company records and to determine the
manner in which email usage will be monitored and controlled, including the “ownership” of email
content transmitted on business email systems.
2/29/2016 Email Policies: Tools to Govern Usage, Access and Etiquette - IT-Toolkits.org
http://it-toolkits.org/blog/?p=72 2/3
3. Email Etiquette: To establish formatting, content and usage guidelines designed to minimize the
risk that email content will be deemed unprofessional, offensive, inappropriate or subject to ridicule
and criticism.
4. Email Management: To establish and implement appropriate technical controls to limit the risks
of inbound email spam, virus and malicious code, and to establish automated procedures for email
backup, storage and retention.
As a whole, usage, oversight, etiquette and management parameters must be combined to formulate
“policy” that is aligned with business and technical needs, realistic considering actual communication
needs, and enforceable considering corporate culture and related technical abilities.
Key Questions for Policy Scope and Content
To ensure that all usage, oversight, etiquette and management needs can be met, adopted email
policies must be designed according to anticipated email usage, corporate culture, characteristics,
business requirements, legal requirements, technical requirements and internal capabilities for
enforcement. The list below provides a head start for policy planning, listing the key questions to be
considered and addressed as part of the policy development process:
Policy Purpose
What are the specific goals of this email policy?
Why has the policy been created (considering the background events leading to policy
development)?
What will the policy accomplish considering email usage, access, etiquette and management
goals and objectives?
Policy Basis
What is the underlying authority and/or organizational basis for this email policy (considering
internal guidelines and/or external regulatory requirements)?
Do you have sufficient executive support to sufficiently enforce compliance with all of the policy
provisions?
Policy Scope
What are the organizational targets of the policy considering company-wide applicability,
division specific application, departmental application or location specific application?
Policy Stakeholders
Who are the policy stakeholders considering both individuals and groups who have a vested
interest in the policy and ability to influence the outcome?
What are the specific roles and responsibilities required to implement, administer and enforce
all policy terms, including all stated compliance obligations?
Email Management
What are the means and methods to be utilized to manage and secure all email systems
considering access, standards for email addresses, restrictions on attachment size, remote
2/29/2016 Email Policies: Tools to Govern Usage, Access and Etiquette - IT-Toolkits.org
http://it-toolkits.org/blog/?p=72 3/3
access, spam and junk mail limitations and related management controls?
Compliance and Enforcement Guidelines
What are established guidelines for email policy compliance?
Will there be any exceptions and/or waivers with regard to policy compliance? If so, what are
the terms under which exceptions and/or waivers will be granted?
How will compliance be enforced and what are the consequences for a failure to comply?
How will employees be provided with training relating to email policy compliance?
What types of auditing procedures will be used to monitor and promote email policy
compliance?
You may also like

Mais conteúdo relacionado

Semelhante a Email policies tools to govern usage, access and etiquette it-toolkits

Information Ethics
Information EthicsInformation Ethics
Information Ethics
UMaine
 
A software engineer designs, develop, tests, and evaluates the sof.docx
A software engineer designs, develop, tests, and evaluates the sof.docxA software engineer designs, develop, tests, and evaluates the sof.docx
A software engineer designs, develop, tests, and evaluates the sof.docx
daniahendric
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
UMaine
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
alokkesh
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docx
makdul
 
Seven Elements Of Effective Compliance Programs
Seven Elements Of Effective Compliance ProgramsSeven Elements Of Effective Compliance Programs
Seven Elements Of Effective Compliance Programs
Maria Macri
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
wacasr
 

Semelhante a Email policies tools to govern usage, access and etiquette it-toolkits (20)

Creating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware PracticesCreating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware Practices
 
Overview of Anti-spam filtering Techniques
Overview of Anti-spam filtering TechniquesOverview of Anti-spam filtering Techniques
Overview of Anti-spam filtering Techniques
 
Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Risky business of social media
Risky business of social mediaRisky business of social media
Risky business of social media
 
A software engineer designs, develop, tests, and evaluates the sof.docx
A software engineer designs, develop, tests, and evaluates the sof.docxA software engineer designs, develop, tests, and evaluates the sof.docx
A software engineer designs, develop, tests, and evaluates the sof.docx
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Ws 601 jump start your share point governance _ then take it home
Ws 601 jump start your share point governance _ then take it homeWs 601 jump start your share point governance _ then take it home
Ws 601 jump start your share point governance _ then take it home
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docx
 
insider threat research
insider threat researchinsider threat research
insider threat research
 
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKSCERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
 
Protecting business interests with policies for it asset management it-tool...
Protecting business interests with policies for it asset management   it-tool...Protecting business interests with policies for it asset management   it-tool...
Protecting business interests with policies for it asset management it-tool...
 
Outsourcing Email Management? Companies are getting the Message
Outsourcing Email Management?  Companies are getting the MessageOutsourcing Email Management?  Companies are getting the Message
Outsourcing Email Management? Companies are getting the Message
 
Seven Elements Of Effective Compliance Programs
Seven Elements Of Effective Compliance ProgramsSeven Elements Of Effective Compliance Programs
Seven Elements Of Effective Compliance Programs
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 
Tl vi a
Tl vi aTl vi a
Tl vi a
 
20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governance
 
CCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdfCCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdf
 

Mais de IT-Toolkits.org

Mais de IT-Toolkits.org (20)

Risk Management & Information Security Management Systems
Risk Management & Information Security Management SystemsRisk Management & Information Security Management Systems
Risk Management & Information Security Management Systems
 
Information Technology & Its Role in the Modern Organization
Information Technology & Its Role in the  Modern OrganizationInformation Technology & Its Role in the  Modern Organization
Information Technology & Its Role in the Modern Organization
 
It Organization Management : Revisiting Centralization
It Organization Management : Revisiting CentralizationIt Organization Management : Revisiting Centralization
It Organization Management : Revisiting Centralization
 
It change management
It change managementIt change management
It change management
 
P2 how to develop an it change management program
P2 how to develop an it change management programP2 how to develop an it change management program
P2 how to develop an it change management program
 
25 important considerations for selecting new customer support tools
25 important considerations for selecting new customer support tools25 important considerations for selecting new customer support tools
25 important considerations for selecting new customer support tools
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
The basics of managing i.t
The basics of managing i.tThe basics of managing i.t
The basics of managing i.t
 
It management audits it management templates
It management audits   it management templatesIt management audits   it management templates
It management audits it management templates
 
What is value added- it management_ - it management templates
What is  value added- it management_ - it management templatesWhat is  value added- it management_ - it management templates
What is value added- it management_ - it management templates
 
7 steps to business and it alignment it management templates
7 steps to business and it alignment   it management templates7 steps to business and it alignment   it management templates
7 steps to business and it alignment it management templates
 
Relevant it – it solutions to bridge the gap between business and it it man...
Relevant it – it solutions to bridge the gap between business and it   it man...Relevant it – it solutions to bridge the gap between business and it   it man...
Relevant it – it solutions to bridge the gap between business and it it man...
 
Finding a common ground between finance and it it management templates
Finding a common ground between finance and it   it management templatesFinding a common ground between finance and it   it management templates
Finding a common ground between finance and it it management templates
 
How to write your company's it security policy it-toolkits
How to write your company's it security policy   it-toolkitsHow to write your company's it security policy   it-toolkits
How to write your company's it security policy it-toolkits
 
Fundamentals of data security policy in i.t. management it-toolkits
Fundamentals of data security policy in i.t. management   it-toolkitsFundamentals of data security policy in i.t. management   it-toolkits
Fundamentals of data security policy in i.t. management it-toolkits
 
Why do you need an it policy it-toolkits
Why do you need an it policy     it-toolkitsWhy do you need an it policy     it-toolkits
Why do you need an it policy it-toolkits
 
Help desk ticket categories create help desk ticket classification it-tool...
Help desk ticket categories  create help desk ticket classification   it-tool...Help desk ticket categories  create help desk ticket classification   it-tool...
Help desk ticket categories create help desk ticket classification it-tool...
 
Help desk mission and vision statements. it-toolkits
Help desk mission and vision statements.   it-toolkitsHelp desk mission and vision statements.   it-toolkits
Help desk mission and vision statements. it-toolkits
 
Help desk problem management it-toolkits
Help desk problem management   it-toolkitsHelp desk problem management   it-toolkits
Help desk problem management it-toolkits
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

Email policies tools to govern usage, access and etiquette it-toolkits

  • 1. 2/29/2016 Email Policies: Tools to Govern Usage, Access and Etiquette - IT-Toolkits.org http://it-toolkits.org/blog/?p=72 1/3 Email Policies: Tools to Govern Usage, Access and Etiquette - IT-Toolkits.org Email is a fast, easy and readily accessible means of business communication. It has changed the way we communicate. These are the obvious rewards – but they are also the basis of every risk. Whenever email content is ill-advised, inappropriate, or even gets into the wrong hands, negative consequences can follow, including legal liability, regulatory penalties, confidentiality breaches, damage to corporate reputation, public embarrassment, internal conflicts, and all the related losses in productivity and performance that these circumstances can cause. Further, data loss and damage to technology assets can be realized through the transmission of malicious code, spam and computer viruses. Perform the “What-if” Analysis: What are the risks to my organization of email abuse and/or misuse, and what are the likely consequences if these risks are not properly addressed? The next step is to weigh the costs and complications of all mitigating actions, and to then strike an appropriate balance between risk and probability. To eliminate email usage is impractical and even unthinkable – so the goal has to be to minimize the risks through the best means possible – and that is through the use of physical security precautions and practical, relevant and enforceable email policy. To realize all of the intended goals and objectives, related policies (which will integrate closely with data security and internet usage policies) must encompass four (4) key governance needs: 1. Email Usage: To determine the circumstances under which email can and will be used within a given organization, whether there will be any limits and/or restrictions on the types of information that can be transmitted via email, as well as any limits and/or restrictions on the use of business email systems for personal communications. 2. Email Oversight: To establish that emails are official company records and to determine the manner in which email usage will be monitored and controlled, including the “ownership” of email content transmitted on business email systems.
  • 2. 2/29/2016 Email Policies: Tools to Govern Usage, Access and Etiquette - IT-Toolkits.org http://it-toolkits.org/blog/?p=72 2/3 3. Email Etiquette: To establish formatting, content and usage guidelines designed to minimize the risk that email content will be deemed unprofessional, offensive, inappropriate or subject to ridicule and criticism. 4. Email Management: To establish and implement appropriate technical controls to limit the risks of inbound email spam, virus and malicious code, and to establish automated procedures for email backup, storage and retention. As a whole, usage, oversight, etiquette and management parameters must be combined to formulate “policy” that is aligned with business and technical needs, realistic considering actual communication needs, and enforceable considering corporate culture and related technical abilities. Key Questions for Policy Scope and Content To ensure that all usage, oversight, etiquette and management needs can be met, adopted email policies must be designed according to anticipated email usage, corporate culture, characteristics, business requirements, legal requirements, technical requirements and internal capabilities for enforcement. The list below provides a head start for policy planning, listing the key questions to be considered and addressed as part of the policy development process: Policy Purpose What are the specific goals of this email policy? Why has the policy been created (considering the background events leading to policy development)? What will the policy accomplish considering email usage, access, etiquette and management goals and objectives? Policy Basis What is the underlying authority and/or organizational basis for this email policy (considering internal guidelines and/or external regulatory requirements)? Do you have sufficient executive support to sufficiently enforce compliance with all of the policy provisions? Policy Scope What are the organizational targets of the policy considering company-wide applicability, division specific application, departmental application or location specific application? Policy Stakeholders Who are the policy stakeholders considering both individuals and groups who have a vested interest in the policy and ability to influence the outcome? What are the specific roles and responsibilities required to implement, administer and enforce all policy terms, including all stated compliance obligations? Email Management What are the means and methods to be utilized to manage and secure all email systems considering access, standards for email addresses, restrictions on attachment size, remote
  • 3. 2/29/2016 Email Policies: Tools to Govern Usage, Access and Etiquette - IT-Toolkits.org http://it-toolkits.org/blog/?p=72 3/3 access, spam and junk mail limitations and related management controls? Compliance and Enforcement Guidelines What are established guidelines for email policy compliance? Will there be any exceptions and/or waivers with regard to policy compliance? If so, what are the terms under which exceptions and/or waivers will be granted? How will compliance be enforced and what are the consequences for a failure to comply? How will employees be provided with training relating to email policy compliance? What types of auditing procedures will be used to monitor and promote email policy compliance? You may also like