>Is anyone able to send me an example of a corporate security policy
>for an Internet connection? This would be of enormous help.
I would also be interested in seeing such a beast! I have been reading
about the practices (and I realize that is the thrust of the list) but
a significant part of managing a network that has unrestricted access
to the outside world is managing the people that have those unprotected
If this is _to_ outside the the tenant of the list, I would be pleased
to be part of a side chat on the subject (especially if some example
documents could be reviewed).
Bill burge @
Quarterdeck Office Systems