Presentation is loading. Please wait.

Presentation is loading. Please wait.

KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures.

Similar presentations


Presentation on theme: "KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures."— Presentation transcript:

1 KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures

2 KELLY Policy & ProceduresAgenda What are the NEW KELLY IT Security Policies and Procedures Why Implement These Now? How Will This Affect Me?

3 KELLY Policy & Procedures The NEW IT Policies and Procedures Acceptable Use Building Security Document Destruction Email Retention Email Use Encryption Info Classification Passwords VPN

4 KELLY Policy & Procedures Acceptable Use Defines what is acceptable use of KELLY equipment (email, workstation)Defines what is acceptable use of KELLY equipment (email, workstation) Details the types of systems and equipment that are expected to only be used for business related purposesDetails the types of systems and equipment that are expected to only be used for business related purposes

5 KELLY Policy & Procedures Building Security Policy ensures the physical security of KELLY properties and the data housed withinPolicy ensures the physical security of KELLY properties and the data housed within Details the type of access, monitoring and reporting and to whom it appliesDetails the type of access, monitoring and reporting and to whom it applies

6 KELLY Policy & Procedures Document Destruction Describes the proper practices regarding the removal and destruction of sensitive paper dataDescribes the proper practices regarding the removal and destruction of sensitive paper data Explains the type of data to be managed, the timeliness and proper methods to insures its appropriate destructionExplains the type of data to be managed, the timeliness and proper methods to insures its appropriate destruction

7 KELLY Policy & Procedures Email Retention Defines guidelines for employees to use to determine what should be kept and for how longDefines guidelines for employees to use to determine what should be kept and for how long This policy is directed not only to email but voice messages as well.This policy is directed not only to email but voice messages as well.

8 KELLY Policy & Procedures Email Use Defines the appropriate use of email and details who this policy effectsDefines the appropriate use of email and details who this policy effects Explains why it is paramount that external and internal emails must adhere to these standardsExplains why it is paramount that external and internal emails must adhere to these standards

9 KELLY Policy & ProceduresEncryption Describes what encryption is and why it should be usedDescribes what encryption is and why it should be used The resulting procedure provides instruction on how to encrypt emailsThe resulting procedure provides instruction on how to encrypt emails

10 KELLY Policy & Procedures Information Classification Defines process for identifying and classifying data and why it is essentialDefines process for identifying and classifying data and why it is essential Explains the levels of security to be used when classifying data and who should have access to what levelsExplains the levels of security to be used when classifying data and who should have access to what levels

11 KELLY Policy & ProceduresPasswords Explains why strong passwords are necessary and the effects of poorly chosen onesExplains why strong passwords are necessary and the effects of poorly chosen ones Outlines the rules and how they will effect your passwordsOutlines the rules and how they will effect your passwords

12 KELLY Policy & Procedures Virtual Private Network (VPN) Defines acceptable usage of the VPN, by whom and for how longDefines acceptable usage of the VPN, by whom and for how long The resulting procedures provide users instructions on how request a VPN and how to install it once grantedThe resulting procedures provide users instructions on how request a VPN and how to install it once granted

13 KELLY Policy & Procedures Why Implement Policies & Procedures? To provide better controls for the physical environment (i.e. your safety)To provide better controls for the physical environment (i.e. your safety) Safeguard all client data sent electronically or housed internallySafeguard all client data sent electronically or housed internally

14 KELLY Policy & Procedures Why Implement Policies & Procedures? Establish security practices to better support long term growth that will require more structureEstablish security practices to better support long term growth that will require more structure –Integrated Payroll Services –Future Lines added (example, Workers Comp)

15 KELLY Policy & Procedures How will these Affect Me? You will be responsible to read and understand these policy and procedures and modify your behavior accordinglyYou will be responsible to read and understand these policy and procedures and modify your behavior accordingly We ask you to use professional judgment where necessaryWe ask you to use professional judgment where necessary Please work with your managers to ensure they are followedPlease work with your managers to ensure they are followed

16 KELLY Policy & Procedures Where to find these documents? For more information, please reference them online on the Inner Circle Home page.For more information, please reference them online on the Inner Circle Home page.


Download ppt "KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures."

Similar presentations


Ads by Google