Académique Documents
Professionnel Documents
Culture Documents
0100090000030202000002008a01000000008a0100002606
0f000a03574d46430100000000000100823f000000000100
0000e802000000000000e8020000010000006c0000000000
0000000000002c0000007100000000000000000000007517
0000c902000020454d4600000100e80200000e0000000200
0000000000000000000000000000981200009e1a0000ca00
0000210100000000000000000000000000003e1303001667
0400160000000c000000180000000a000000100000000000
00000000000009000000100000008d050000a70000002500
00000c0000000e000080120000000c000000010000005200
000070010000010000009cffffff0000000000000000000000
00900100000000000004400012540069006d006500730020
004e0065007700200052006f006d0061006e000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000
00cb30093000000000040000000000ae3008310930000000
0067169001001002020603050405020304877a0020000000
800800000000000000ff01000000000000540069006d0065
0073002000000065007700200052006f006d0061006e0000
00540069006d006500730020004e0065007700200052006f
006d0061006e000000a04811004c3eaf30b8481100647600
0800000000250000000c00000001000000180000000c0000
0000000002540000005400000000000000000000002c0000
0071000000010000005fcc874078b88740000000005a0000
00010000004c0000000400000000000000000000008b0500
00a9000000500000002000720f2d00000046000000280000
001c0000004744494302000000ffffffffffffffff8e050000a800
000000000000460000001400000008000000474449430300
0000250000000c0000000e0000800e000000140000000000
Email security
Policy summary
This policy defines and distinguished acceptable/appropriate from unacceptable/inappropriate use
of electronic mail (email).
Applicability
This is a standard corporate policy that applies throughout the organization as part of the corporate
governance framework. It applies to all users of the corporate email systems.
Policy Detail
Background
Email is perhaps the most important means of communication throughout the business world.
Messages can be transferred quickly and conveniently across our internal network and globally via
the public Internet. However, there are risks associated with conducting business via email. Email
is not inherently secure, particularly outside our own internal network. Messages can be
intercepted, stored, read, modified and forwarded to anyone, and sometimes go missing. Casual
comments may be misinterpreted and lead to contractual or other legal issues.
NoticeBored information security awareness Email security policy
Responsibilities
Information Security Management is responsible for maintaining this policy and
advising generally on information security controls. Working in conjunction with other
corporate functions, it is also responsible for running educational activities to raise
awareness and understanding of the responsibilities identified in this policy.
IT Department is responsible for building, configuring, operating and maintaining the
corporate email facilities (including anti-spam, anti-malware and other email security
controls) in accordance with this policy.
IT Help/Service Desk is responsible for assisting users with secure use of email
facilities, and acts as a focal point for reporting email security incidents.
All relevant employees are responsible for complying with this and other corporate
policies at all times. This policy also applies to third party employees acting in a similar
capacity whether they are explicitly bound (e.g. by contractual terms and conditions) or
implicitly bound (e.g. by generally held standards of acceptable behavior) to comply with
our information security policies.
Internal Audit is authorized to assess compliance with this and other corporate policies
at any time.
Email security General advice for email users, first released through the security
guidelines, top tips awareness program in September 2007. Includes advice on email
etc. etiquette, avoiding phishing emails and virus-infected emails etc.
NoticeBored information security awareness Email security policy
Contacts
For further information about this policy or information security in general, contact the Information
Security Manager. A variety of standards, procedures, guidelines and other materials supporting
and expanding upon this and other information security policies are available in the organization’s
Information Security Manual, on the corporate intranet and through the Information Security
Manager. Local IT/information security contacts throughout the organization can also provide
general guidance on the implementation of this policy - contact your line manager or the IT
Help/Service Desk for advice.
f commonplace controls in this area. Because it is generic, it cannot fully reflect every user’s requirements.
this provided that (a) it is not sold or incorporated into a commercial product, (b) it is properly attributed to