SlideShare a Scribd company logo
1 of 14
SECURITY-POLICY AND
PROCEDURE OF
COMPANIES
AbdullahR.Rajab&AhmedM.AL-Amoudi
Outline:
 Significance
 Benefits
 Manuals
 Procedures Manual
 The Policies Manual
 The Employee Handbook
 Example of policy
Significance
Businesses should establish policies and procedures and
commit them to print before hiring the first employee. Policies,
defined simply as rules as to how the company or department
and its representatives should handle specific scenarios, and
procedures, meaning instructions as how to accomplish certain
tasks, are crucial to every business, regardless of size.
http://goo.gl/JZSCGg
Benefits
Establishing a company's policies and procedures provides
several benefits. The company is able to operate with greater
consistency, both in its internal and external workings.
Company morale generally increases because guidelines are
available on how to accomplish a task. Set policies and
procedures can also circumvent certain legal issues.
http://goo.gl/JZSCGg
Manuals
The policies and procedures manuals of a business should be
in accordance with local, state and federal laws, as well as
conscious of Internet use. The books need to appear
professional; a financier may request a copy of the policies and
procedures of a company under review.
http://goo.gl/JZSCGg
Procedures Manual
The procedures manual clearly describes processes, such as
how to enter an invoice into the system, processes with which
the new employee will not yet be familiar. Describe procedures
specifically.This may seem quite simplistic to the writer who is
familiar with the tasks at hand, but to the novice, a precise
explanation of the procedure may be invaluable.
http://goo.gl/JZSCGg
The Policies Manual
This manual should contain the company's policies on
employment, disclosure, competition, customer service,
purchasing and so forth. When writing a policies manual, keep
in mind whether, if the owner could not be reached, what
would an employee need to know to accomplish his assigned
tasks
http://goo.gl/JZSCGg
The Employee Handbook
This will be the first formal communication the company has
with a new employee. As an abbreviated policies and
procedures manual, it defines standards of behavior and
outlines what will happen when those standards are not
upheld. The handbook should contain the company's employee
policies and procedures for asking for leave and similar
requests. Management may find this to be an empowerment
tool should it need to discipline an employee.
http://goo.gl/JZSCGg
EXAMPLE OF POLICY
Limit Internet Usage
 An Internet Usage policy should address whether or not employees are allowed to use company’s
computers for personal use.
 whether or not software may be downloaded by anyone other than a system administrator.
 should also consider whether or not Instant Messaging may be used during company time and/or on
company equipment.
http://goo.gl/gQErpT
Email/Social Networking
 Your email policy should address appropriate content for company emails and social media
pages
key Control
 Your key control policy should include a means to track who is currently holding mechanical keys and
who has permission to duplicate those keys.
http://goo.gl/gQErpT
Visitor Management
 steer all visitors into a controlled entry point.
 the visitors should be escorted at all times.
 Requiring on visitors wear a badge and sign in and out should also be considered.
 notify the visitor on management policy.
Non-Disclosure Agreement
 make sure that employees understand what information they may and may not pass
on.
http://goo.gl/gQErpT
Desktop Computers
Each and every computer in the company must be protected by:
 good antivirus program.
 complete packages that provide an extra level of protection are Internet security suites.
Laptop Computers and Mobile Devices
make sure that laptops and other mobile devices are protected at all time by:
 Sensitive information must be protected with encryption
http://goo.gl/gQErpT
Conclusion
One key to creating effective policies is to make sure that they are
clear, and as easy to comply with as possible. Policies that are overly
complicated only encourage people to bypass the system. Don’t make
employees feel like inmates. Communicate the need, and you can create
a culture of security.
There is always a trade-off between security and convenience.You
would like to board a plane without going through theTSA checkpoint,
right? But how comfortable would you be knowing that no one else on
the plane had gone through security either?The policies described in this
article will help to ensure that you and your employees are protected.
http://goo.gl/gQErpT

More Related Content

Similar to Policy and procedure of companies

Making enterprise mobility a success.
Making enterprise mobility a success.Making enterprise mobility a success.
Making enterprise mobility a success.Olive Communications
 
Running your business_online_and_offline
Running your business_online_and_offlineRunning your business_online_and_offline
Running your business_online_and_offlineFlora Runyenje
 
ISO FAQ and Common Mistakes
ISO FAQ and Common MistakesISO FAQ and Common Mistakes
ISO FAQ and Common Mistakeslins421
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Matthew Charles
 
Background screening
Background screeningBackground screening
Background screeningcaptsbtyagi
 
Outsourcing for your_business
Outsourcing for your_business Outsourcing for your_business
Outsourcing for your_business Flora Runyenje
 
Running Head Operational Components1Operational Component.docx
Running Head Operational Components1Operational Component.docxRunning Head Operational Components1Operational Component.docx
Running Head Operational Components1Operational Component.docxtodd581
 
Running Head Operational Components1Operational Component.docx
Running Head Operational Components1Operational Component.docxRunning Head Operational Components1Operational Component.docx
Running Head Operational Components1Operational Component.docxglendar3
 
7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategyMaarten BOONEN
 
Corporate governance
Corporate governance Corporate governance
Corporate governance Tanvir Omi
 
The Realities of Implementing a Remote Workforce
The Realities of Implementing a Remote WorkforceThe Realities of Implementing a Remote Workforce
The Realities of Implementing a Remote WorkforceRichard Hatheway
 
Bpm in financial services michael heffner (foreword)
Bpm in financial services   michael heffner (foreword)Bpm in financial services   michael heffner (foreword)
Bpm in financial services michael heffner (foreword)Neeraj Jaisingh
 
The secrets of learning, training and assessments in regulatory compliance
The secrets of learning, training and assessments in regulatory complianceThe secrets of learning, training and assessments in regulatory compliance
The secrets of learning, training and assessments in regulatory complianceThomas Jenewein
 
Ariba Knowledge Nuggets: eProcurement Transformation
Ariba Knowledge Nuggets:  eProcurement TransformationAriba Knowledge Nuggets:  eProcurement Transformation
Ariba Knowledge Nuggets: eProcurement TransformationSAP Ariba
 

Similar to Policy and procedure of companies (20)

Business outsourcing
Business outsourcingBusiness outsourcing
Business outsourcing
 
Making enterprise mobility a success.
Making enterprise mobility a success.Making enterprise mobility a success.
Making enterprise mobility a success.
 
Running your business_online_and_offline
Running your business_online_and_offlineRunning your business_online_and_offline
Running your business_online_and_offline
 
ISO FAQ and Common Mistakes
ISO FAQ and Common MistakesISO FAQ and Common Mistakes
ISO FAQ and Common Mistakes
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)
 
Background screening
Background screeningBackground screening
Background screening
 
Outsourcing for your_business
Outsourcing for your_business Outsourcing for your_business
Outsourcing for your_business
 
Running Head Operational Components1Operational Component.docx
Running Head Operational Components1Operational Component.docxRunning Head Operational Components1Operational Component.docx
Running Head Operational Components1Operational Component.docx
 
Running Head Operational Components1Operational Component.docx
Running Head Operational Components1Operational Component.docxRunning Head Operational Components1Operational Component.docx
Running Head Operational Components1Operational Component.docx
 
7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy7 steps to build an effective corporate compliance strategy
7 steps to build an effective corporate compliance strategy
 
PACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other DocumentsPACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other Documents
 
Corporate governance
Corporate governance Corporate governance
Corporate governance
 
The Realities of Implementing a Remote Workforce
The Realities of Implementing a Remote WorkforceThe Realities of Implementing a Remote Workforce
The Realities of Implementing a Remote Workforce
 
Bpm in financial services michael heffner (foreword)
Bpm in financial services   michael heffner (foreword)Bpm in financial services   michael heffner (foreword)
Bpm in financial services michael heffner (foreword)
 
The secrets of learning, training and assessments in regulatory compliance
The secrets of learning, training and assessments in regulatory complianceThe secrets of learning, training and assessments in regulatory compliance
The secrets of learning, training and assessments in regulatory compliance
 
Ariba Knowledge Nuggets: eProcurement Transformation
Ariba Knowledge Nuggets:  eProcurement TransformationAriba Knowledge Nuggets:  eProcurement Transformation
Ariba Knowledge Nuggets: eProcurement Transformation
 
Keys to Enabling Air Passes
Keys to Enabling Air PassesKeys to Enabling Air Passes
Keys to Enabling Air Passes
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
Facility management training
Facility management trainingFacility management training
Facility management training
 
October 2017 newsletter
October 2017 newsletterOctober 2017 newsletter
October 2017 newsletter
 

Recently uploaded

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Recently uploaded (20)

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Policy and procedure of companies

  • 2. Outline:  Significance  Benefits  Manuals  Procedures Manual  The Policies Manual  The Employee Handbook  Example of policy
  • 3. Significance Businesses should establish policies and procedures and commit them to print before hiring the first employee. Policies, defined simply as rules as to how the company or department and its representatives should handle specific scenarios, and procedures, meaning instructions as how to accomplish certain tasks, are crucial to every business, regardless of size. http://goo.gl/JZSCGg
  • 4. Benefits Establishing a company's policies and procedures provides several benefits. The company is able to operate with greater consistency, both in its internal and external workings. Company morale generally increases because guidelines are available on how to accomplish a task. Set policies and procedures can also circumvent certain legal issues. http://goo.gl/JZSCGg
  • 5. Manuals The policies and procedures manuals of a business should be in accordance with local, state and federal laws, as well as conscious of Internet use. The books need to appear professional; a financier may request a copy of the policies and procedures of a company under review. http://goo.gl/JZSCGg
  • 6. Procedures Manual The procedures manual clearly describes processes, such as how to enter an invoice into the system, processes with which the new employee will not yet be familiar. Describe procedures specifically.This may seem quite simplistic to the writer who is familiar with the tasks at hand, but to the novice, a precise explanation of the procedure may be invaluable. http://goo.gl/JZSCGg
  • 7. The Policies Manual This manual should contain the company's policies on employment, disclosure, competition, customer service, purchasing and so forth. When writing a policies manual, keep in mind whether, if the owner could not be reached, what would an employee need to know to accomplish his assigned tasks http://goo.gl/JZSCGg
  • 8. The Employee Handbook This will be the first formal communication the company has with a new employee. As an abbreviated policies and procedures manual, it defines standards of behavior and outlines what will happen when those standards are not upheld. The handbook should contain the company's employee policies and procedures for asking for leave and similar requests. Management may find this to be an empowerment tool should it need to discipline an employee. http://goo.gl/JZSCGg
  • 10. Limit Internet Usage  An Internet Usage policy should address whether or not employees are allowed to use company’s computers for personal use.  whether or not software may be downloaded by anyone other than a system administrator.  should also consider whether or not Instant Messaging may be used during company time and/or on company equipment. http://goo.gl/gQErpT
  • 11. Email/Social Networking  Your email policy should address appropriate content for company emails and social media pages key Control  Your key control policy should include a means to track who is currently holding mechanical keys and who has permission to duplicate those keys. http://goo.gl/gQErpT
  • 12. Visitor Management  steer all visitors into a controlled entry point.  the visitors should be escorted at all times.  Requiring on visitors wear a badge and sign in and out should also be considered.  notify the visitor on management policy. Non-Disclosure Agreement  make sure that employees understand what information they may and may not pass on. http://goo.gl/gQErpT
  • 13. Desktop Computers Each and every computer in the company must be protected by:  good antivirus program.  complete packages that provide an extra level of protection are Internet security suites. Laptop Computers and Mobile Devices make sure that laptops and other mobile devices are protected at all time by:  Sensitive information must be protected with encryption http://goo.gl/gQErpT
  • 14. Conclusion One key to creating effective policies is to make sure that they are clear, and as easy to comply with as possible. Policies that are overly complicated only encourage people to bypass the system. Don’t make employees feel like inmates. Communicate the need, and you can create a culture of security. There is always a trade-off between security and convenience.You would like to board a plane without going through theTSA checkpoint, right? But how comfortable would you be knowing that no one else on the plane had gone through security either?The policies described in this article will help to ensure that you and your employees are protected. http://goo.gl/gQErpT