SPRING DISCOUNT
Get 30% off on toolkits, course exams, and Conformio yearly plans.
Limited-time offer – ends April 25, 2024
Use promo code:
SPRING30

Expert Advice Community

Guest

Control number A.8.1.3

  Quote
Guest
Guest user Created:   Sep 14, 2020 Last commented:   Sep 14, 2020

Control number A.8.1.3

What does acceptable use of assets intend to say in the control number A.8.1.3

0 0

Assign topic to the user

ISO 27001 IT SECURITY POLICY

Define the detailed security rules for everyone in the company.

ISO 27001 IT SECURITY POLICY

Define the detailed security rules for everyone in the company.

Expert
Rhand Leal Sep 14, 2020

This control intends to say that rules for the use of information assets and resources (e.g., Internet, e-mail, internal systems, etc.), must be defined, implemented, and communicated to all personnel included in the ISMS scope, so they can know what is and what is not allowed to do.

To see how a document compliant with this control looks like, see the document demo in this link: https://advisera.com/27001academy/documentation/it-security-policy/

For further information, see:

Quote
0 0

Comment as guest or Sign in

HTML tags are not allowed

Sep 14, 2020

Sep 14, 2020

Suggested Topics