The following are samples of agreements that an organization can refer to as it develops its own Information and Technology Security Agreements for staff, contractors, and other individuals who are to be given access to equipment, information, or networks. These samples have been compiled from existing agreements that are currently in use in schools and local education agencies. The conditions they specify may or may not be applicable to all potential readers, and are, therefore, presented only as a resource. They do not in any way represent a standard or an agreed-upon convention.
These sample Information and Technology Security Agreements do not take the place of security
policies, guidelines, and procedures that are customized to meet the specific needs of an organization. In fact, precisely the opposite is true. The following agreements are designed to certify that the signer acknowledges that relevant security policies, guidelines, and procedures have been developed by the organization and subsequently presented to the signer in a clear and meaningful way that outlines what their security responsibilities will be. These agreements are, therefore, simply the formal mechanisms by which the signer acknowledges that he or she is aware of the information and technology security policies, guidelines, and procedures, and agrees to abide by them.
Employee Information and Technology Security Agreement
I acknowledge that [name of organization]'s information and technology security policies, guidelines, and
procedures have been made available to me for review and consideration. I also certify that I have
been given ample opportunity to have any and all questions about my responsibilities addressed. I am,
therefore, aware that I am accountable for information and technology security procedures as they govern
the acceptable performance of my job. I understand that failure to abide by any and all policies, guidelines,
and procedures can result in organizational, civil, or criminal action and/or the termination of my
employment.
Signature: ______________________________ Printed Name: ______________________________
Job Title: ___________________________________ Date: ______/_____/______
|
Contractor/Consultant/Outsider Information and Technology Security Agreement
I acknowledge that [name of organization] has provided me with adequate time to review and consider
the information and technology security policies, guidelines, and procedures it deems applicable to
responsibilities I am undertaking on behalf of [name of organization], regardless of my employment status. I also certify that I have been given ample opportunity to have any and all questions about my responsibilities addressed. I am, therefore, aware that I am accountable for those information and technology security procedures as they relate to my work for, or on the behalf of, [name of organization]. I understand that failure to abide by any and all policies, guidelines, and procedures can result in organizational, civil, or criminal action and/or the termination of my relationship with [name of organization].
Signature: ______________________________ Printed Name: ______________________________
Affiliation: ___________________________________ Date: ______/______/______
|
|