ISC2 Annapolis Junction Chapter
Menu icoMenu232White icoCross32White

Add a logo, a button or social media links

Edit
icoLinkedin24Color
  • ISC2 Annapolis Junction Chapter
  • Home ▴▾
  • About Us ▴▾
    • A Chapter of ISC2
    • A Message from the Chapter President
    • Management Committee
    • Our Chapter Timeline
  • Membership ▴▾
  • Sponsors & Partners ▴▾
    • Current Sponsors
    • In-Kind Sponsors
    • Cybersecurity Community Partners
    • Sponsorship Levels
    • Sponsorship Form
  • News ▴▾
  • Programs and Events ▴▾
    • Chapter Calendar
    • Guest Speaker Application Form
    • Monthly Chapter Meeting Registration
    • Guest Speaker Spotlight Session Registration
    • Education and Training Event Registration
  • Frequently Asked Questions (FAQs) ▴▾
  • icoMail32White
    Contact Us ▴▾
  • Log in
  • A Chapter of ISC2
  • A Message from the Chapter President
  • Management Committee
  • Our Chapter Timeline
  • Current Sponsors
  • In-Kind Sponsors
  • Cybersecurity Community Partners
  • Sponsorship Levels
  • Sponsorship Form
  • Chapter Calendar
  • Guest Speaker Application Form
  • Monthly Chapter Meeting Registration
  • Guest Speaker Spotlight Session Registration
  • Education and Training Event Registration

EXPECTED USE POLICY: ISC2 ANNAPOLIS JUNCTION CHAPTER

I. PURPOSE The purpose of this Expected Use Policy is to formally establish and document the ISC2 AJ Chapter (AJ Chapter) users’ responsibilities and expected behavior when utilizing the chapter's digital and non-digital resources. This policy provides guidance to AJ Chapter users on activities that are prohibited when accessing the chapter’s digital and non-digital resources, including the public website, member portal, and internal administrative platforms.

II. SCOPE This policy applies to all AJ Chapter personnel, users, assets, or processes acting on behalf of a person(s) that process, store, transmit, receive, access, or distribute data created by the AJ Chapter. This includes, but is not limited to, volunteers utilizing the Chapter’s Google Workspace environment and members utilizing the Springly-hosted web portal. Any users that intentionally circumvent or deviate from this policy may be subject to account suspension, access revocation, or additional disciplinary actions.

III. MANAGEMENT COMMITMENT The AJ Chapter’s President and Management Committee is committed to overseeing, managing, and improving the information security program to mitigate risks, threats, and vulnerabilities. The Management Committee support will ensure all users who are granted access to chapter resources adhere to the requirements set forth in this policy.

 

 

 

 

 

 

 

 

 

 

 

 


 

VI. SYSTEM USE POLICY

1. Intellectual Property and Asset Usage

1.1 Any digital or non-digital products (documents, spreadsheets, presentations, reports, databases, applications, or scripts) created or stored using AJ Chapter resources (including Google Drive and Springly) are the intellectual property of the AJ Chapter.

1.2 Chapter resources shall be used for approved chapter business only. Users are prohibited from commingling personal data with AJ Chapter resources.

1.3 All data stored in AJ Chapter repositories shall not be exfiltrated, downloaded, or offloaded to external storage locations without explicit approval from the Technology Director.

2. Prohibited Content and Conduct

2.1 Users must avoid websites or activities that contain graphic, abusive, threatening, harmful, or unlawful content.

2.2 Users are prohibited from using AJ Chapter resources to engage in discrimination based on age, sexual orientation, race, color, religion, ethnicity, gender expression, disability, or any other protected class.

2.3 Users shall not use AJ Chapter resources to propagate political agendas, messaging, or legislative advocacy.

2.4 Personal opinions expressed online regarding the AJ Chapter must include the disclaimer: “These opinions and content are my own and do not represent the opinions, interests, or views of the ISC2 Annapolis Junction Chapter.”

3. Cybersecurity and Technical Restrictions

3.1 Users shall refrain from leveraging chapter technology for malicious activities, including creating or disseminating malicious payloads, phishing, AI poisoning, botnets, or ransomware.

3.2 Users shall not conduct penetration or compliance testing on any software, APIs, or databases owned by the AJ Chapter without prior approval from the Chapter President.

3.3 Any discovered vulnerabilities, policy violations, or security incidents must be reported to the Technology Director and President immediately.

3.4 Users shall not install or use tools designed to circumvent security controls.

4. Credential and Facility Security

4.1 All lost, stolen, or compromised virtual credentials or physical hardware must be reported to the Technology Director immediately.

4.2 Users must report all facility breaches or suspicious activities at AJ Chapter event spaces to the Management Committee.

4.3 Users must never share or make publicly available any account credentials to any systems or facilities owned or rented by the AJ Chapter.

 

 

 

 

Copyright 2026, ISC2 Annapolis Junction Chapter. All Rights Reserved. ISC2, CC, CISSP, CCSP
SSCP, CGRC, ISSAP, ISSEP, ISSMP, CSSLP, and CBK are registered
certification, service, and trademarks of International Information System Security
Certification Consortium, Inc.

Copyright 2026, ISC2 Annapolis Junction Chapter. All Rights Reserved. ISC2, CC, CISSP, CCSP
SSCP, CGRC, ISSAP, ISSEP, ISSMP, CSSLP, and CBK are registered
certification, service, and trademarks of International Information System Security
Certification Consortium, Inc.
Legal
  • Privacy Policy
  • Expected Use Policy
icoLinkedin24Color
  • Site map
  • Licenses
  • Legal notice
  • T&C
  • Configure cookies
  • Log in
  • Powered by Springly, created with 💙 for organizations everywhere