Scope
Section outline
-
This course applies to all staff within the Company (meaning permanent, fixed term, and temporary staff, any third-party representatives or sub-contractors, agency workers, volunteers, interns, and agents engaged with the Company in the UK or overseas). Adherence to this policy is mandatory and non-compliance could lead to disciplinary action.
The scope of all information security measures covers the Company’s whole IT infrastructure and includes: -
[As the boundary of scope for protective measures differs for every firm, we are unable to define the scope for you. You will need to specify here the boundary of scope that is covered by the measures and policies you have in place for information security. This means detailing which devices, networks, and systems are covered by measures such as firewalls and malware protections (i.e. personal devices, removable storage, servers, etc). You can also detail anything that is outside of the scope of these measures (i.e. externally managed services, cloud-based, etc)]
The companies IT infrastructure is described here – https://projects.rebsoc.com/projects/ameuri/wiki/Hardware_and_Cloud_Assets_Inventory
The outsourced IT support services are explained here - https://projects.web-translations.co.uk/projects/ameuri/wiki/Outsourced_IT_Support
The information management used by the company is described here - https://projects.web-translations.co.uk/projects/ameuri/wiki/Information_Management