kelly technology department proven experience of yesterday creative solutions for today innovative...

16
KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures

Upload: eric-chandler

Post on 05-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures

KELLY Technology Department

Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow

Corporate Policy and Procedures

Page 2: KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures

KELLY Policy & Procedures

AgendaAgenda

• What are the NEW KELLY IT Security Policies and Procedures

• Why Implement These Now?

• How Will This Affect Me?

Page 3: KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures

KELLY Policy & Procedures

The NEW IT Policies and ProceduresThe NEW IT Policies and Procedures

• Acceptable Use

• Building Security

• Document Destruction

• Email Retention

• Email Use

• Encryption

• Info Classification

• Passwords

• VPN

Page 4: KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures

KELLY Policy & Procedures

Acceptable UseAcceptable Use

• Defines what is acceptable use of KELLY equipment (email, workstation)Defines what is acceptable use of KELLY equipment (email, workstation)

• Details the types of systems and equipment that are expected to only be Details the types of systems and equipment that are expected to only be used for business related purposesused for business related purposes

Page 5: KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures

KELLY Policy & Procedures

Building SecurityBuilding Security

• Policy ensures the physical security of KELLY properties and the data Policy ensures the physical security of KELLY properties and the data housed withinhoused within

• Details the type of access, monitoring and reporting and to whom it Details the type of access, monitoring and reporting and to whom it appliesapplies

Page 6: KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures

KELLY Policy & Procedures

Document DestructionDocument Destruction

• Describes the proper practices regarding the removal and destruction of Describes the proper practices regarding the removal and destruction of sensitive paper datasensitive paper data

• Explains the type of data to be managed, the timeliness and proper Explains the type of data to be managed, the timeliness and proper methods to insures its appropriate destructionmethods to insures its appropriate destruction

Page 7: KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures

KELLY Policy & Procedures

Email RetentionEmail Retention

• Defines guidelines for employees to use to determine what should be Defines guidelines for employees to use to determine what should be kept and for how longkept and for how long

• This policy is directed not only to email but voice messages as well.This policy is directed not only to email but voice messages as well.

Page 8: KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures

KELLY Policy & Procedures

Email UseEmail Use

• Defines the appropriate use of email and details who this policy effectsDefines the appropriate use of email and details who this policy effects

• Explains why it is paramount that external and internal emails must Explains why it is paramount that external and internal emails must adhere to these standardsadhere to these standards

Page 9: KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures

KELLY Policy & Procedures

EncryptionEncryption

• Describes what encryption is and why it should be usedDescribes what encryption is and why it should be used

• The resulting procedure provides instruction on how to encrypt The resulting procedure provides instruction on how to encrypt emailsemails

Page 10: KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures

KELLY Policy & Procedures

Information ClassificationInformation Classification

• Defines process for identifying and classifying data and why it Defines process for identifying and classifying data and why it is essentialis essential

• Explains the levels of security to be used when classifying data and Explains the levels of security to be used when classifying data and who should have access to what levelswho should have access to what levels

Page 11: KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures

KELLY Policy & Procedures

PasswordsPasswords

• Explains why strong passwords are necessary and the effects of poorly Explains why strong passwords are necessary and the effects of poorly chosen oneschosen ones

• Outlines the rules and how they will effect your passwordsOutlines the rules and how they will effect your passwords

Page 12: KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures

KELLY Policy & Procedures

Virtual Private Network (VPN)Virtual Private Network (VPN)

• Defines acceptable usage of the VPN, by whom and for how longDefines acceptable usage of the VPN, by whom and for how long

• The resulting procedures provide users instructions on how request a The resulting procedures provide users instructions on how request a VPN and how to install it once grantedVPN and how to install it once granted

Page 13: KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures

KELLY Policy & Procedures

Why Implement Policies & Procedures?Why Implement Policies & Procedures?

• To provide better controls for the physical environment (i.e. your safety)To provide better controls for the physical environment (i.e. your safety)

• Safeguard all client data sent electronically or housed internallySafeguard all client data sent electronically or housed internally

Page 14: KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures

KELLY Policy & Procedures

Why Implement Policies & Procedures?Why Implement Policies & Procedures?

• Establish security practices to better support long term growth that Establish security practices to better support long term growth that will require more structurewill require more structure

– Integrated Payroll ServicesIntegrated Payroll Services

– Future Lines added (example, Workers Comp)Future Lines added (example, Workers Comp)

Page 15: KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures

KELLY Policy & Procedures

How will these Affect Me?How will these Affect Me?

• You will be responsible to read and understand these policy and You will be responsible to read and understand these policy and procedures and modify your behavior accordinglyprocedures and modify your behavior accordingly

• We ask you to use professional judgment where necessaryWe ask you to use professional judgment where necessary

• Please work with your managers to ensure they are followedPlease work with your managers to ensure they are followed

Page 16: KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures

KELLY Policy & Procedures

Where to find these documents?Where to find these documents?

• For more information, please reference them online on the Inner Circle For more information, please reference them online on the Inner Circle Home page.Home page.