Preview

It 255 Final Project

Good Essays
Open Document
Open Document
1588 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It 255 Final Project
Dear Richman Investments Senior Management,
It has come to my attention that your corporate security policy for the firm is out of date and that it needs to be updated. In my time here as an intern I have reviewed the security policy and revised it to keep up with all of the technological updates going on in the internet world today.
I was assigned this project and being that we have 5000 employees operating in different locations and different parts of the country; I have noticed that some of the other branches do not follow the firms’ policies as they should. Some branches operate on their own policies. I have drafted up a new and improved corporate security policy that covers emails, mobile devices, computer usage, email retention policies, passwords, etc.
I hope this will help streamline our security policy across the board so that everyone is on the same page and so there is no misinterpretation of the firm employee or otherwise. RICHMAN INVESTMENTS CORPORATE SECURITY POLICY

Use of Phone and Mail Systems
Personal use of the telephone for long-distance and toll calls is not permitted. Employees should Practice discretion when making local personal calls and may be required to reimburse The Firm for any charges resulting from their personal use of the telephone. The mail system is reserved for business purposes only. Employees should refrain from sending or receiving personal mail at the workplace. To ensure effective telephone communications, employees should always use the approved greeting and speak in a courteous and professional manner. Please confirm information received from the caller, and hang up only after the caller has done so. Computer and E-mail Usage Computers and other media of electronic communications ("Media") are the property of the Firm which has a legitimate business interest in the proper utilization of its property. Therefore, any use of the Firm's property, and any electronic communications sent or received, may be monitored

You May Also Find These Documents Helpful

  • Satisfactory Essays

    -Policy will be implemented to document all security policies and operation policy to secure cardholder data that will be stored in company database. (System/Application Domain & LAN Domain & Remote Access Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 242 Final Project

    • 1213 Words
    • 5 Pages

    ACME Manufacturing will best benefit from a Wide Area Network by the use of a VOIP. ACME currently has a headquarter in Atlanta that has a corporate operation, accounting, marketing, and an administrative staff. They also have a sales office and engineering office in Atlanta as well. In Chicago, New York, and Phoenix they have their distribution office. I find that ACME will benefit from subnets, routers, packaging, and VLAN’s and security to make sure that the WAN network is successful for WAN network…

    • 1213 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Communication in a business is the key to success. Interpersonal communication is very important in today 's often technologically anonymous society. An assessment as to the current Telephone Communication Systems configurations at all four state area locations was made. Recommendations for improvements will be noted after the discussion of the current systems in order of state, followed by specific locale.…

    • 976 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    We will educate employees on how to properly secure information by user ID and password management training. Instructing them on how to…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By conducting security awareness training, you can educate the user/employee on the policies and standards. Also make the user/employee aware of the violation consequences if the said policies and standards are broken. To further implement this security awareness plan, follow up by sending out reminder/updates in a bi-weekly email and flyer handout.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    It 210 Final Project

    • 1033 Words
    • 5 Pages

    Write, “Select international currency type: Canadian dollars, Mexican pesos, English pounds, Japanese yen, French francs.”…

    • 1033 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Hostland, K, Enstad, A. P, Eilertsen, O, Boe, G. (2010). Information Security Policy: Best Practice Document.…

    • 4525 Words
    • 19 Pages
    Better Essays
  • Good Essays

    Shockingly, there were several organizations that admitted that they omit their privacy policies and procedures from their internal website. Many organizations reported that they assess and/or monitor their employees to ensure they are in compliance with information security policy standards. A very small percentage of the surveyed respondents said that they recorded who they used as a third party vendor who could access their data. This could be problematic for companies that are too cheap and lazy, so to prevent this, they must ensure that both companies are using security and privacy procedures. High priority initiatives for companies in the future are to hire top executives and subject matter experts for their information security areas, invest in security protection technologies, and conduct trial and error tactics to see what works best on security issues that may…

    • 252 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Proper security measures play a huge role in the successful operation of an organization. As the security manager for a company that manufactures high-tech components for an international automobile manufacturer I have been tasked with finding new personnel to ensure security measures are met. There are two different types of security I can choose from; proprietary and contract security. I have done extensive research on the two, to help me make the correct decision for this company. There are some advantages and disadvantages to each type; so I had to find the one that best matches the needs of this company. Proprietary and contract security have the same objectives. They protect the company that they are providing security for. This includes protecting company assets, confident material, ensuring the safety of personnel and consumers, and building.…

    • 1248 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Telephone systems play a very important role in the modern workplace. Telephone systems give individuals the ability to communicate and share information. During the early years of telephones, there was a limited amount of functions that could be used. In the modern workplace, there are many more functions that telephone systems are capable of. Multi-user calls, or conference calls, are now fairly standard. VOIP telephone service provides the cost saving solutions which are very helpful for making international calls at a much lower rate as compared to the other modes of communication. Used in various communications needs and requirements, VOIP telephones are very common. Many Voip handsets are available in the market. Telephone exchanges then operated under the licensed name of the Bell Telephone Company. Telephone systems are more complex and have more advanced features than the phones typically used for personal communication. Although they resemble the telephones that can be found in everyone’s home, office telephone systems deliver considerably more performance for business operations. The operational requirements and the budgetary needs are specific to each company and corporation.…

    • 497 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    WEB 435 Week 1 DQ 2

    • 393 Words
    • 2 Pages

    This work of WEB 435 Week 1 Discussion Question 2 comprises: A successful security policy requires the support of senior management. Should management also be involved in the development of a web security policy?…

    • 393 Words
    • 2 Pages
    Satisfactory Essays