Version: 1.0

Approved By: Richard D’Lonesteen

Created at: 12/08/2023

1. Purpose

The purpose of this policy is to manage and mitigate risks associated with endpoint vulnerabilities on all company-operated devices, specifically Windows and Mac machines. This document outlines required security measures, including the adoption of specific security tools and mandatory update processes, to safeguard organizational data and assets from potential security threats.

2. Scope

This policy applies to all employees, contractors, and third-party vendors who use Windows and Mac devices to access the company's network and data.

3. Policy Statement

4. Enforcement

Compliance with this policy is mandatory. The IT department must ensure the installation of required software during the setup of devices and thereafter maintain configurations as prescribed herein, including timely updates and scans.

Violations of this policy may result in disciplinary action, up to and including termination of employment or contracts. Continuous non-compliance may also result in restricted access to the company's networks and devices until corrective measures are implemented.

5. Maintenance and Review

6. Exceptions

Any exceptions to this policy must be approved by the CISO and documented with specific reasons and expected duration of the exception. All exceptions will be periodically reviewed to assess the continuing need against potential risks.