The different types of policies

///The different types of policies
The different types of policies2019-09-02T23:07:01+02:00
  • IT acceptable use policy or IT policies like email use policy, BYOD policy, computer usage policy or internet usage policy, data protection policy or protection of personal information policy

There are many different types of policies, including IT ones. Let us look at the different types of policies in an organisation. The different categories and names get confusing and many organisation end up with so many policies. For this reason, it is crucial to have a good policy framework or structure.

Types of policies

You get all types of policies dealing with many different issues.

  • Policies of the governing body that set the strategic direction for an organisation, like a compliance policy or an anti-bribery and corruption policy.
  • HR policies focus on issues such as leave, safety and health, smoking, sexual harassment and HIV or AIDS, and recruitment and selection policy.
  • Finance policies focus on issues related to paying and receiving money, like a fraud prevention policy
  • Customer policies like a complaints resolution policy, help desk policy, returns policy or customer acceptable use policy.
  • Standard operating procedures (or SOPs) that set out how different things are done.
  • IT policies or ICT policies focus on information, communication or technology.

Actions you can take

  • Update your policies by asking us to review it. You might want to start with just one.
  • Put a good one in place by asking us to draft one for you.

Categories of IT policies

IT Policies or ICT policies can be broken down into categories of policies, for example:

  • Information security policies focus on managing and protecting and preserving information (including personal information) belonging to the organisation, which is processed by those employees in the course and scope of their employment. Examples include an incident response policy or an access control policy.
  • Information management policies, like a record retention and destruction policy.
  • Data governance policy like a master data policy, data classification policy or framework or data sharing policy.
  • Acceptable use policies, like a backup policy, asset disposal policy, BYOD policy, clean desk policy, electronic communications policy, email usage policy, Internet usage policy, or social media policy
  • Freedom of information policies, like an Access to information manual (PAIA Manual) or a public disclosures policy.
  • IT Governance, Risk and Compliance (IT GRC) policies, like a compliance policy.
  • Contract management policies, like a  document review policy.
  • Project and Change Management policies.
  • IT Goods or Services Acquisition policies.
  • Availability management policies, like disaster recovery policy (DR), business continuity (BC).

We draft or review IT policies or ICT Policies through a “legal lens” focusing on legal compliance and legal risk issues in accordance with your policy framework.

There is an overlap between HR policies and IT policies to the extent that the “human factor” is common to both of them and both therefore cover issues involved in the employer and employee relationship. In our experience, the HR and IT Departments are not good at “speaking to one another” the end result being that a lot of important IT related risks posed by employees through their use of technology are not dealt with and “fall through the cracks“.

Issue and audience

There are two key questions relating to any policy:

  1. What is the issue to be addressed?
  2. Who is the intended audience? Who must comply with the policy?

Some Issue-specific IT policies

There are many essential issue-specific policies.

  1. Access control
  2. Acceptable Use of IT
  3. Use of Software
  4. Protection from Malicious Software
  5. Bring your own device (BYOD) or personally owned devices
  6. Mobility
  7. Telecommuting
  8. Computer use
  9. Email use
  10. Incident response (or breach management policy under POPI)
  11. Internet use
  12. Technology or device management (like laptops, cell phones, or cameras)
  13. Mobile technology
  14. Monitoring or interception of communications
  15. Physical and environmental security
  16. User accounts and passwords
  17. Backing up of information
  18. External facing and internal facing privacy policies
  19. Protection of Personal Information Policy or Data Protection Policy
  20. Social media
  21. Digitisation (or document imaging) policies
  22. Email archiving policies
  23. Electronic signature guidelines

Combined IT Policy

We advocate an approach which clearly differentiates between issue-specific, operational policies, standards and procedures, each of which should be set forth in separate documents. However, certain clients specifically want one policy that covers several areas of acceptable use that we normally cover in separate policies. For them, we have developed a combined document (sometimes called an Acceptable Use of IT Policy or an Electronic Communications Policy (ECP)). It is essentially many specific policies wrapped into one document directed at one intended audience (like users).

Characteristics of good Policies

They should be:

  • short and to the point
  • in plain and understandable language
  • well structured
  • consistent
  • in accordance with and in line with the latest laws and rules
  • clear on what is permitted and what is not
  • specific, relevant and applicable to the target audience