Computer security policy and procedures template

Control or prohibit use of external and personal devices such as USB (see Section 3.10) Information loss – Violation of legislation or regulation – Adversely affect reputation – Breach of confidentiality – Poor or no backup procedures – Lack of appropriate access control Effective, monitored backup … ................
................