1.0 Introduction Richman Investments at all times is to establish acceptable and unacceptable use of electronic devices and network resources. All employees of Richman Investments must comply with the rules and regulations for use of the Internet, sending e-mail, going to social media sites, and downloading attachments. The Richman Investments AUP will help achieve these goals.
2.0 Scope Every supervisor, employee and temporary employee that works for Richman Investments must follow this policy as it is written. This policy also applies to all equipment affiliated with Richman Investments.
3.0 Policy 3.1 General 1. As an employee of Richman Investments, you are responsible for using good judgment regarding the use of internet access. In ordnance with the policies set forth by Richman Investments resources may not be used for any unlawful or prohibited purpose. For extra security Richman Investments will monitor all systems, equipment, and network using the Audit Policy. Any devices that might interfere with the Richman Investments network will be immediately disconnected. Firewalls must be turn on at all times.
3.2 Security 1. Every device connected to the Richman Investments network must comply with the Access Control Policy 2. All employees of Richman Investments must keep their passwords secure. 3. Every laptop, PDA, desktop or workstations must be secured with a password protected screensaver and with a activation lock of 15 minutes or less. All employees must log off when they are finished using the device. 4. Always use encryption in compliance with Richman Investments Acceptable Encryption Use Policy. 5. All Richman Investments employees should use caution with opening up an e-mail attachment. Do not open up an e-mail attachment from a unnamed source. These attachments might contain spam, viruses or even Trojan Horses. 3.3 Unacceptable Use 1. Sending spam using e-mail, text messages, or instant messages 2. Giving your password out to other employees, or letting other employees use your account. 3 Unauthorized copying of copyrighted material that includes books, music, photographs or magazines. 4. Causing a security breach to Richman Investments or other network resources, but not limited to, accessing data, servers, or accounts you don’t have access to which you are not authorized.
4.0 Enforcement Any employee who violates this policy will be immediately terminated
You May Also Find These Documents Helpful
-
The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access.…
- 348 Words
- 1 Page
Satisfactory Essays -
The plan to secure the workstation domain enforces a strong password policy on each workstation and also enables screen lockout protection for inactive times. Keeping all workstations with an up to date antivirus is essential. Furthermore, content filtering features will arrange access of specific domain names according to AUP definitions. In addition, workstations will have up-to-date application software and security patches conferring to company guide lines. As part of the workstation security strategy IT will disable the auto-play feature and will enable automatic scan for any external devices that may be connected to the machine. This measure will ensure the content is secure.…
- 663 Words
- 2 Pages
Satisfactory Essays -
The purpose of this policy is to define standards for connecting to Richman Investments network from any host. These standards have been designed to minimize the potential exposure to Richman Investments from damages which may result from unauthorized use of Richman Investments resources. Damages include intellectual property, the loss of sensitive or company confidential data, damage to critical Richman Investments internal systems, damage to public image, etc.…
- 438 Words
- 2 Pages
Good Essays -
Security is embraced by the executive management staff at MJD Electronics. An important task for the Chief Security and Compliance Officer for MJD Electronics is to outline a plan that makes considerations for many of the important aspects of valid security architecture. This discussion presents more detailed information on many topics that should be included in a solid security architecture including border routers, demilitarized zones, proxy firewalls, access control lists and filters, fail-safe equipment, and more.…
- 5030 Words
- 21 Pages
Powerful Essays -
In the workstation domain, each workstation, whether desktop or laptop, must have antivirus and malware protection installed on them. Laptops are vulnerable to loss and theft, so laptops should have an encrypted hard drive so that if stolen, the data contained on them is not compromised.…
- 337 Words
- 2 Pages
Satisfactory Essays -
Firewall these devices are designed to keep threats out of the company network, but unfortunately, the devices are configured by humans which can have error or security risks put in place to take over the network.…
- 1030 Words
- 5 Pages
Good Essays -
During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…
- 711 Words
- 3 Pages
Good Essays -
Activity 8-9: Evaluate an acceptable use policy. Learn whether the organization where you work or attend school has an acceptable computer use policy for employees or students. Make a list of activities that are permitted and those that are not permitted. Identify on your list those activities that are illegal and those that are not permitted according to organizational policy. Compare your organization’s computer use policy with the University of Oregon’s policy referenced in the chapter. Describe the similarities and differences.…
- 477 Words
- 2 Pages
Satisfactory Essays -
You will gain an understanding of the aspects involved in the conception, enforcement, and implementation of security policies. You will also gain insight to risk analysis and will learn how to respond to any given situation that might arise from a violation of those security policies.…
- 588 Words
- 3 Pages
Good Essays -
After research and careful consideration of some of the other policies listed by other companies such as AT&T, Sprint, T-Mobile, and Verizon Wireless, Richman Investments has come up with the an acceptable use policy (AUP).…
- 303 Words
- 2 Pages
Satisfactory Essays -
As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…
- 755 Words
- 4 Pages
Good Essays -
Richman Investments recognizes the risks associated with users using and accessing data in order to properly conduct assigned tasks, jobs, or conduct official employer business. Information is often shared throughout the network and possibly with external sources or clients. Securing ALL data and ensuring network integrity is of…
- 1232 Words
- 5 Pages
Powerful Essays -
Identify at least two types of security events and baseline anomalies that might indicate suspicious activity.…
- 554 Words
- 3 Pages
Satisfactory Essays -
Create a simple Internet OR e-mail use policy for Richman Investments that defines the acceptable and unacceptable use of Internet and e-mail access at Richman. Go to the SANS website at http://www.sans.org/security-resources/policies/ to view sample policies.…
- 451 Words
- 2 Pages
Satisfactory Essays -
Richman Investments holds requirements for the usage of the company network including filtering polocies for network traffic.…
- 326 Words
- 2 Pages
Satisfactory Essays