Previous Topic: Personally Identifiable Information (PII) PoliciesNext Topic: User Defined Policies


Security General / Corporate Policies

Audio Files

Sensitive information may be recorded and sent out of the organization. Protect and control the transmittal of audio media files.

E-mail to Personal Addresses

This policy identifies electronic communication with attachment(s) being sent to non-commercial domains (Hotmail, Yahoo, Gmail, and domains ending in .gov, .edu, .info, and so on), which immediately raises concerns as to whom the information is being distributed.

Forwarding Senior Management E-mail or Documents

This policy detects the forwarding of content originally sent by senior management.

Graphic and Image Files

This policy identifies graphic and image files in various formats.

Large Message or File Size

This policy identifies users sending messages over a certain size or files over a certain size.

Large Print Job Warning

This policy detects print jobs that exceed a specified number of pages and warns the user.

Network Security Threats

This policy identifies common hacking utilities and terms such as spoofing, buffer overflow tools, log wiping tools and password database cracking tools.

Password Protection/Encryption: Prohibition

This policy detects content that has been protected with a password or has been encrypted.

Random Sample

Regulators suggest that adding a targeting a reasonable percentage of messages for random review, in addition to normal lexicon-based reviews, is a prudent practice since such random reviews may discover issues not normally detected by ordinary means. This policy will randomly select messages, based on a percentage that is defined by the firm, to be automatically included in a reviewer’s queue.

Sharing of Usernames and Passwords

This policy detects the disclosure and sharing of passwords both inside and outside the organization.

Suspicious E-mail Behavior

This policy identifies electronic communication with blank subjects whose context suggests that the sender is attempting to avoid detection.

Transfer of Attachments - Threshold

This policy identifies electronic communication with a specified number (or threshold) of attachments, which could suggest a drive dump or other inappropriate bulk transfer of files.

Transfer of Personal E-mail File Folders

This policy identifies inappropriate bulk transfer of e-mail file folders which includes .PST and .NSF files.

Video Files

This policy identifies video media files in various formats.