Model Security Policies, Plans, and Procedures

John J. Fay

Publisher: Butterworth-Heinemann, 1999, 317 pages

ISBN: 0-7506-7183-1

Keywords: Information Security, Human Resources

Last modified: Aug. 6, 2021, 6:07 p.m.

Model Security Policies, Plans, and Procedures contains sample security policy, planning, and procedural documents drawn from the proven experiences of hundreds of America's most successful corporations. If your job requires you to develop or update security policies, plans, or procedures, this book will be highly valuable resource. The samples cover the key concepts of organizational protection. Putting the samples to use, either as presented or as drafting guides, can eliminate many hours of tedious research and writing.

  • Policies
    • Affirmative Action
    • Business Ethics
    • Conflicts of Interest
    • Deadly Force
    • Drug and Alcohol Abuse
    • Equal Employment Opportunity
    • Equal Employment Opportunity for the Disabled, Vietnam-Era Veterans, and Special Disabled Veterans
    • Firearms
    • General Business
    • Harassment
    • Health, Safety, and the Environment
    • Information Security
    • Internet
    • Investigations
    • Political Contributions
    • Protection of Assets
    • Security
    • Sexual Harassment
    • Smoking
    • Special Project Security
    • Travel and Entertainment
    • U.S. Sentencing Guidelines
    • Workplace Violence
  • Plans
    • Access Control
    • Bomb Threat
    • Building Emergency
    • Business Continuity
    • Civil Disturbances
    • Country Evacuation
    • Extortion
    • Fire Emergency
    • Kidnap
    • Physical Security
    • Security Awareness
    • Severe Weather
  • Procedure
    • AIDS Contact
    • Anti-Eavesdropping
    • Anti-Stalking
    • Attack Avoidance
    • Auto Theft Prevention
    • Background Checking
    • Bank Security Officer
    • Bomb Protection
    • Bomb Threats
    • Canine Security
    • Civil Process Acceptance
    • Classification of Sensitive Information
    • Cleaning Crew Access Control
    • Clear Desk
    • Computer Virus Protection
    • Conference Security
    • Driving Safeguards
    • Duress Alarm
    • Electronic Information Security
    • Electronic Mail Protection
    • Emergency Calls
    • Employee Access Control
    • Executive Protection
    • Fire Responses by Security Officers
    • Flag Etiquette
    • Handling Classified Information
    • Hazards Identification
    • Home Burglary Prevention
    • Hotel Guest Security
    • Hotel Security Officer
    • Information Protection at the Office
    • Internet Protection
    • Intranet Protection
    • Lost and Found
    • Medical Emergencies
    • Office Building Evacuation
    • Office Inspections
    • Office Security
    • Office Security Management
    • Password Protection
    • Property Removal
    • Rape Avoidance
    • Repair Crew Access Control
    • Retail Security
    • Security Program Auditing
    • Sexual Harassment Reporting
    • Store Security Officer
    • Substance Abuse Program Audit
    • Telephone Answering
    • Two-Way Radio

Reviews

Model Security Policies, Plans, and Procedures

Reviewed by Roland Buresund

Mediocre **** (4 out of 10)

Last modified: Nov. 15, 2008, 2:19 a.m.

This is just a collection of policies! They may be useful as a starting point, but I found them a bit too shallow.

Comments

There are currently no comments

New Comment

required

required (not published)

optional

required

captcha

required