Approved Application Policy

This is an example approved application policy.

1.0 Overview
All employees and personnel that have access to organizational computer systems must adhere to the approved application policy in order to protect the security of the network, protect data integrity, and protect computer systems.

2.0 Purpose
This policy is designed to protect the organizational resources on the network by requiring all network users to only run or install application programs deemed safe by the IT department.

3.0 Approved Applications
All employees may operate programs on the IT approved application list. If an employee wants to use an application not on the list, they should submit the application program to the IT department for approval prior to using the program on a system connected to the organizational network.

If the employee causes a security problem on the network by installing and running an unapproved program they risk disciplinary action.

4.0 Exceptions
Special exception may be made to this policy for specific employees depending on the required job function and the skills of the employee. Some reasons for exception include:

  1. The employee may be the person who needs to test new applications on a test network, then on the main network.
  2. The employee may be a developer that must run applications developed by themselves in order to test their own work.
  3. Network administrators may be allowed the ability to operate and test new software.

5.0 Enforcement
Since running safe programs is critical to the security of the organization, employees that do not adhere to this policy may be subject to disciplinary action up to and including dismissal.

6.0 Approved Applications

    IT department approved applications are listed below.
  • Microsoft Office Suite
  • Groupwise
  • Mozilla firefox
  • DCDS
  • Adobe Acrobat
  • Microsoft Visio
  • Symantec Antivirus
  • Roxio Easy CD Creator
  • WinZip
  • Zonealarm firewall