User Policy Examples
Computer System/Information Technology/Information System Policies – The core of any cyber security program consists of polices to ensure the safety of the users and their organization. The following policies are provided as examples and/or templates and may be adapted to meet the specific needs of an organization.
Photocopiers, Fax machines and Printers
Photocopiers, fax machines and printers may contain a hard drive or flash memory that stores digital images of the documents that are copied, transmitted or printed by the device. Businesses, public safety agencies and health care providers (organizations) use these devices regularly to process documents which often contain sensitive and confidential information.