Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Receipt and Acknowledgement of Information Security Policies

All new TracFone consultants (including temporary employees) are provided a copy of the following
Information Security policies prior to accessing the TracFone network:

 End-User Computing Policy


 Information Security Policy & Procedures (for IT consultants only)
 Data Leakage Prevention and Data Classification Guidelines
 Data Leakage Prevention (DLP) End-User Training (for consultants who will use TracFone-issued
workstations/laptops)

Consultants must agree to comply with these policies as a condition of their engagement.

In complying with the above TracFone Information Security policies, consultants are to be particularly
aware of the following important controls aimed at reducing the company’s exposure to security risks:

1. Wireless connectivity to the TracFone network is not permitted. The use of any device (routers,
wireless cards, etc.) that allows for wireless connectivity to the company network is not permitted.

2. No personal computing equipment (such as laptops) is to be used on the TracFone network


unless specifically authorized in writing by management and approved by Information Security in
advance.

Non-compliance with one or more of these policies will impact consultants’ tenure at TracFone.

Acknowledgement by Consultant and Temporary Employee

By signing below, I acknowledge that I have received and will fully comply with the above TracFone
Information Security policies.

_____________________________________ __12/18/18_____________
Consultant Signature Date

DANA A REED_______ _________________


Printed Name

SAILPOINT TECHNOLOGIES_____________
Vendor Name

You might also like