In-Class Exercise: Creating Cybersecurity Policies

Remote Access Policy for Halo Apparel
Effective Date: 2/12/25
BLUF (Bottom Line Up Front):
All remote access to Halo Apparel’s systems must use MFA and a company VPN. Only approved users with necessary access can connect; all devices must meet security standards. Sensitive data must be encrypted, and incidents must be reported immediately. Non-compliance will result in access revocation or disciplinary action. Purpose: To ensure secure and compliant remote access to company resources for employees, contractors, and third parties in the retail industry.

1. Who This Applies To

  • All employees, contractors, and third parties accessing Halo Apparel’s systems remotely.

2. Key Rules
Access Control

  • Remote access must be pre-approved by IT and your manager.
  • Use Multi-Factor Authentication (MFA) for all logins.
  • Access is limited to what’s necessary for your role (least privilege).
    Secure Connections
  • Always use the company VPN to access internal systems.
  • Avoid public Wi-Fi; if used, always connect through the VPN.
    Device Security
  • Company devices: Keep antivirus, firewalls, and software up to date.
  • Personal devices (BYOD): Must meet minimum security standards (encryption,
    approved security software).
  • Lock devices when not in use.

3. Data Protection

  • Encrypt sensitive data (e.g., customer info, payment data) during transmission and
    storage.
  • Follow Halo Apparel’s Data Handling Policy.

4. Monitoring & Compliance

  • All remote access is logged and monitored.
  • Regular audits ensure policy compliance.
  • Report security incidents (e.g., lost devices, breaches) immediately to IT Security at
    haloIT@happarel.com.

5. Consequences

  • Non-compliance may result in access revocation or disciplinary action, up to termination.
  1. Acknowledgment
    By signing below, you agree to follow this policy.
    Name: _______________
    Signature: ___________
    Date: _______________
    This policy protects Halo Apparel’s data and systems while enabling secure remote work.
    Communication Plan
  2. Announce: Email all staff with policy highlights and link to full doc.
  3. Train: Host a 15-min session; share a one-pager cheat sheet.
  4. Acknowledge: Require signed confirmation within 7 days.
  5. Remind: Send quarterly updates and include in onboarding.
    Review Plan
  6. Annual Review: IT, HR, and legal assess policy yearly.
  7. Trigger Reviews: After incidents, regulation changes, or infrastructure updates.
  8. Feedback: Gather employee/IT input during reviews.
  9. Update: Version and date the policy after changes.

Leave a Reply

Your email address will not be published. Required fields are marked *