Page 64 - Ipsos
P. 64
Information Classification: Internal Use
Ipsos Book of Policies & Procedures
TABLE OF CONTENTS
1.0 Summary .............................................................................................................................. 3
2.0 Purpose and Scope .............................................................................................................. 3
2.1 Objectives ................................................................................................................ 3
2.2 Core principles ......................................................................................................... 3
2.3 Scope ....................................................................................................................... 3
2.4 Applicability .............................................................................................................. 4
3.0 Responsibilities ..................................................................................................................... 4
3.1 Communication and Maintenance Responsibilities ................................................. 4
3.2 Users’ responsibility ................................................................................................. 4
3.3 Violations ................................................................................................................. 4
4.0 Computer Acceptable Use Policy ......................................................................................... 5
4.1 Use of Ipsos Devices ............................................................................................... 5
4.2 Use of Personal Devices ......................................................................................... 6
5.0 Social Media Policy .............................................................................................................. 6
6.0 My I-365 Usage Policy .......................................................................................................... 7
6.1 My I-365 - Outlook ................................................................................................... 8
6.2 My I-365 - Yammer .................................................................................................. 8
6.3 My I-365 - Lync (Skype for Professionals) .............................................................. 9
6.4 OneDrive .................................................................................................................. 9
6.5 SharePoint ............................................................................................................. 10
7.0 Access Policy ...................................................................................................................... 10
7.1 Unauthorised access ............................................................................................. 10
7.2 Remote Access Policy ........................................................................................... 11
8.0 Mobile Device Use Policy ................................................................................................... 11
8.1 Scope ..................................................................................................................... 11
8.2 Out of Scope .......................................................................................................... 11
8.3 Configuration ......................................................................................................... 12
8.4 Usage .................................................................................................................... 12
9.0 Password/Authentication Policy ......................................................................................... 13
9.1 Password Length ................................................................................................... 13
9.2 Password complexity ............................................................................................. 13
9.3 Password Re-Use .................................................................................................. 13
9.4 Frequency of Change ............................................................................................ 13
9.5 Confidentiality of Authentication Details ................................................................ 14
10.0 Physical Security Policy ...................................................................................................... 14
10.1 Clean Desk and Clear Screen Policy .................................................................... 14
10.2 Physical Access Policy .......................................................................................... 15
10.3 Requirements for Safeguarding your Laptop, PC and Mobile Devices ................. 16
Appendix 1 - Definitions and Abbreviations ..................................................................................... 17
Page 2 of 17