Preview

course project ITT

Powerful Essays
Open Document
Open Document
4392 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
course project ITT
A TECHNOLOGY COMPANY DOD CYBER SECURITY POLICY INTRODUCTION:
Information technology continues to expand in use and importance throughout all aspects of life and A Technology Company (ATC). It is an indispensable tool for education, and research and plays a central role in the overall life of ATC.
PURPOSE:
The uses of information technology have changed dramatically over the last twenty years, and it is likely that the rate of change will accelerate in the future. For these reasons, it is critical that A Technology Company articulate a clear statement regarding the appropriate uses of our information technology resources and institute safeguards to ensure that our technology is secure, reliable, and available for the all employees of ATC.
SCOPE:
This document will cover the acceptable use of all IT resources on the ATC network in compliance with DoD Standards and Compliance Laws. This policy will be in effect for all employees of ATC, including but not limited to; Contractors, Vendors & any person with access to ANY ATC IT resource.
ACCEPTABLE USE POLICY:
By signing this policy you acknowledge and consent that when you access ANY ATC IT Resource:
1. I will use ATC IT Resources (computers, systems, and networks) only for authorized purposes.
2. I will not try to access data or use operating systems or programs, except as specifically authorized.
3. I know I will be issued a user identifier (user ID) and a password to authenticate my ATC.com account. After receiving them—
a. I will not allow anyone else to have or use my password. If I know that my password is compromised, I will report to my ATC Information System Security (ISS) Team for a new one.
4. I will not run “sniffers” (utilities used to monitor network traffic, commonly used to Spy on other network users and attempt to collect their passwords) or any hacker-related software on my IT system, or network.
5. If I observe anything on the system I am using that indicates inadequate

You May Also Find These Documents Helpful

  • Good Essays

    Unit 9 Assignment 1

    • 582 Words
    • 2 Pages

    - Ensure compliance requirements of this policy concerning data at rest and role-holders access to managed networks, systems and servers…

    • 582 Words
    • 2 Pages
    Good Essays
  • Better Essays

    IS 3350: Policy Report

    • 1146 Words
    • 5 Pages

    The purpose of this policy is to understand what needs to be done with documents that contain…

    • 1146 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Nt1310 Unit 1 Assignment 1

    • 1252 Words
    • 6 Pages

    Companies use information as a weapon in the battle to increase productivity, deliver quality products and services, maintain customer loyalty, and make sound decisions. Information technology can mean the difference between success and failure…

    • 1252 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    This policy applies to all IDI Stakeholders, Committees, Departments, Partners, Employees of IDI (including system support staff with access to privileged administrative passwords), contractual third parties and agents of the Council with any form of access to IDI’s information and information systems.…

    • 1356 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Activity 8-9: Evaluate an acceptable use policy. Learn whether the organization where you work or attend school has an acceptable computer use policy for employees or students. Make a list of activities that are permitted and those that are not permitted. Identify on your list those activities that are illegal and those that are not permitted according to organizational policy. Compare your organization’s computer use policy with the University of Oregon’s policy referenced in the chapter. Describe the similarities and differences.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The following guidelines are expected to be upheld by all staff and employees, without exception:…

    • 1402 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 4104 Words
    • 17 Pages

    Information Technology (IT) is a set of tools, processes and methodologies (such as coding, programming, data communications, data conversion, storage and retrieval, system analysis and design, systems control) and associated equipment employed to collect, process, and present information. In broad terms, IT also includes office automation, multimedia and telecommunications. It is defined as the technology used involving the development, maintenance, and use of computer systems, software, and networks for the processing and distribution of data. IT is a broad subject concerned with all aspects of managing and processing information, especially within a large organization or company. Because computers are central to information management,…

    • 4104 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    I am a network intern at Richman Investments. My supervisor has asked me to make an Acceptable Use Policy for our company because one of our employees infected our server with a virus. So in order to keep the organization safe I have come up with a Acceptable Use Policy for Richman Investments.…

    • 441 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Information Technology, IT, is an integral property in a business’ success. In order for an organization to reach its maximum potential this organization will need to be coordinated and integrated. For as the organization moves on to higher levels of integration it will find many potential benefits to be gained.…

    • 432 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Such correct use includes the re-registration/renewal notifications, special offers and surveys, conducted with the purpose of the improvement of our service.Payment Information:If you are register to use the Service provided by inetsack, you will be required to enter proper credit card information, or other payment information, which is necessary for the completion of the payment process. inetsack may use a third party to process and verify the information you have provided for billing purposes. This requires the sharing of the user name, credit card number, expiration date and the billing address with the credit card processing company. When a payment transaction is being processed, inetsack is also eligible to obtain any information regarding the amount needed for the successful completion of the transaction, as well as other data. We may transfer or disclose the stated payment information to a third party, only when it…

    • 1057 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Acceptable Use Policy

    • 1915 Words
    • 8 Pages

    Purpose. The purpose of this Acceptable Use Policy is to provide guidelines which will be applied in determining acceptable use of this Web site, and to notify you of the terms of this service. As a user of this service, you agree to comply with this policy, the stated acceptable uses and the terms of service.…

    • 1915 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Faa Fsims

    • 310 Words
    • 2 Pages

    • enhance standardization by accessing the same version of policy and guidance as other FAA employees…

    • 310 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Use of IT changed a lot in the work environment. It has not only enhanced the efficiency of work but also become the most effective tool for communication. E-mail and VOIP are some of the examples of IT tool. However, to address this new phenomenon, organizations have to initiate new policies as well, e.g. IT Policy.…

    • 781 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Memo Sample

    • 324 Words
    • 2 Pages

    The company will not tolerate any employee downloading or uploading unauthorized software from the Internet.…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information technologies (IT) are vital to Company operations. They are tools that improve the quality and efficiency of our work. They are the repositories for critical and sometimes highly proprietary corporate information. The improper access to or the destruction of these resources will have serious consequences for the Company. The strategic use of information technology can help organizations increase their competitive advantage and make considerable improvements in operating performance.…

    • 301 Words
    • 2 Pages
    Good Essays