This document outlines policies for protecting company data and information systems. It discusses employee responsibilities to report any computer issues or security incidents. Unauthorized software, suspicious internet links, and unapproved social media use are prohibited. Third parties must agree to comply with security policies before accessing systems. Physical access controls and equipment are implemented to restrict access to sensitive areas and information. An information inventory classifies and tracks assets, and policies govern archiving, storage, off-site removal, disposal, and compliance.