Sample – Unauthorized Access Policy
February 3, 2013Users are prohibited from: Gaining unauthorized access to any Corporate information system Abusing authorized access for personal gain, malicious purposes, or in a way that would result in damage, alteration, or disruption of these systems Capturing or obtaining passwords, encryption keys, or any other access control mechanism which could...