Partnerships

Belkasoft
Elcomsoft
Legal & Other

Disclaimer
Cookies
Use of this website (T&Cs)    
Environmental Responsibility
Compliance
Data Privacy
Documentation

Articles
White Papers
Brochures
Press Releases
Subscribe to our Newsletter

Our Websites

Visit our sister websites
Copyright Strathclyde Forensics © 2009-2015. All Rights Reserved.
About us

Our People
Our Clients
What our Clients say
High Profile Cases
Contact us
Strathclyde Forensics website is found to be Safe by NORTON SAFE WEB Strathclyde Forensics website is found to be Safe by NORTON SAFE WEB
Strathclyde Forensics website is found to be SAFE by McAfee SECURE (Siteadvisor) Strathclyde Forensics website is found to be SAFE by McAfee SECURE (Siteadvisor)
"Absence of evidence is not
evidence of absence"
Our Blogs

Check out our Blogs
Terrorist Alerts

MI5 (UK)
Department of Homeland Security (USA)

Cyberattacks (real time)
Kaspersky
FBI Cyber Most Wanted

Home
ICTTF logo ICTTF logo
ACPO Guidelines ACPO Guidelines
Scottish Legal Aid logo Scottish Legal Aid logo
The American Society of Digital Forensics & eDiscovery The American Society of Digital Forensics & eDiscovery
Limbus Studio Limbus Studio
DFS Logo DFS Logo
Audit of IT Policies
In a recent case in an Employment Tribunal in Glasgow, we made a strong case for an unfair dismissal because the employer (the NHS, one of the largest in the country) did not set up a clear and up to date IT Policy.

A major mistake of small businesses is the lack of an IT policy. A written, clear guideline of the usage of the company's computer infrastructure, access to the internet for personal and business purposes and the use of the rest digital devices.

Strathclyde Forensics can prepare your IT policy and Internet Usage Policy for your employees.

You IT Policy is a document where you dictate what use of the computers and IT infrastructure is acceptable by your employees, and what is not. It is a document that you can offer (with a signed receipt) to each and every employee, and it can be part of the terms and conditions of their employment. It will protect you in future disputes, if a case reaches an employment tribunal or a court.

But one of the newest trends that turns to a security epidemic is that of BYOD ("Bring Your Own Device") at work. Allowing your employees to access your network through their devices (devices that you have not cleared yet), you put a blind trust on someone not to affect your security.

Apart from the legal protection, when employees adhere by a set policy, this minimizes the risk of loss of data, infections by malware and breaches of security in general. It also allows you, the business to perform your due diligence in case something goes wrong. And if it comes to that, a solid IT Policy will you enforce your disciplinary procedures.

Please contact us to discuss your tailor made Policy documentation