IT Policies
IT policies which govern acceptable use practices within the organization.
Systems & Securities Policy
Currently under review Telephone & Email Email signatures must conform to our company standard ...
Password Policy
The following policy outlines the password requirements employees must follow in order to ensure ...
Assigned Equipment
Outlines what equipment each employee can expect when employed with George & Bell Consulting and ...
Equipment for Home
Every employee of George & Bell, upon employment is provided with a predefined set of equipment f...
Office-Based Equipment
Each desk at George & Bell is provided with a predefined set of equipment for use when working in...
Hardware Replacement
IT-based equipment at George & Bell Consulting is replaced per the schedule below or when deemed ...
Restrictions
Device Restrictions
Removeable Storage Media To eliminate the possibility of having a laptop compromised via removab...
Application Restrictions
Currently employees have full administrative access to their laptop, allowing for any application...
Email Restrictions
Attachments Any email message with the following attachment filetypes will be blocked upon being...