Preview

Personal Device Policy

Good Essays
Open Document
Open Document
822 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Personal Device Policy
XYZ Credit Union/Bank: Personal Device Policy
1. Overview
a. XYZ Credit Union/Bank allows employees to purchase and use their own smartphones, tablets, and laptops at work for their convenience. This privilege can be taken away at any time by XYZ Credit Union/Bank if employees do not follow the policies and procedures outlined below.
b. This policy is intended to protect the security and integrity of XYZ Credit Union/Bank’s data and technology infrastructure.
c. Employees wishing to use a device must obtain approval for the device from their supervisor and the IT department. Each device will require a separate approval. Upon successful approval the device can then connect to the network as outlined in section 4.
2. Acceptable Devices
a. Acceptable
…show more content…
Once connected, the employee will be directed to a web page where they must agree to the acceptable use policy.
c. The employee will achieve monitored access to all available internet resources.
5. Security
a. In order to prevent unauthorized access, devices must be password protected using the features of the device. The password must follow the company’s strong password policy.
b. The company’s strong password policy is: Passwords must be at least seven characters in length and a combination of upper and lower-case letters, numbers and symbols. Passwords will be rotated every 90 days and the new password can’t be one of 5 previous passwords.
c. The device must lock itself with a password or PIN if it’s idle for five minutes.
d. Rooted (Android) or jailbroken (iOS) devices are strictly forbidden from accessing the network.
e. Smartphones and tablets that are not on the company’s list of supported devices are/are not allowed to connect to the network.
f. Smartphones and tablets belonging to employees that are for personal use only are/are not allowed to connect to the network.
g. Employees’ access to company data is limited based on user profiles defined by the IT department and automatically enforced.
h. The employee’s device may be remotely wiped if
i. The device is

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Remote access for employees is deployed by using remote access VPN connections across the Internet based on the settings configured for the VPN Server, and the following additional settings.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nick Finsterbusch

    • 2610 Words
    • 11 Pages

    In order to properly authenticate on the wireless network, you must agree and sign the ITT Wireless Network Release Form. You can acquire this form from your local System Support Technician.…

    • 2610 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Task 3

    • 4254 Words
    • 17 Pages

    Develop mobile device policies/procedure. Implement security safeguards based on policies/procedure documents. Make sure network is designed with mobile devices in mind.…

    • 4254 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    The network administrator and the network security administrator need to be aware of these types of products and how they can be used to create low-cost covert networks in the workplace. The administrators need to be aware of the push-to-talk feature on cell phones and understand, for example, that sensitive documents can be leaked by the use of cell phone cameras. The administrators not only need to be aware of these technologies, but they need to update their policies and procedures so they can take legal action against employees who leak information.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Good Essays

    IS3120 Week 5 Lab

    • 914 Words
    • 3 Pages

    Outside of the computer labs and other locations with wired devices; this relegates the students would be utilizing the WLAN the most as most (if not all) of the admin/faculty have designated terminals. This covers students with mobile devices in classrooms with no computers or wired access, as well as students in the common areas, and/or their dorm.…

    • 914 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The following are Acceptable Use Policy or AUP for rolling Network Access and Internet Usage for Richman Investments. The qualification for the usage of the company network composed of filtering policies for traffic in the network and the usage of the internet are spelled out in this AUP. The use of the Internet is a privilege, not a right and inappropriate use will result in a cancellation of those privileges. The purpose of the internet resources is to help employees of the company for the performance of their job related functions and not for personal use. Each employee that is given these privileges will have to comply with the company’s policy.…

    • 882 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There are employee and guest wireless (wifi) networks that are available for leadership and clients that need to access the Internet on their wireless devices and laptops. There is also an additional wifi network that is set-up for other employees to use on personal laptops, ipads, tablets, etc.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt2580 Unit 4 Aup

    • 432 Words
    • 2 Pages

    The acceptable use policy is a set of rules that a corporation, organization or internet service providers, provide to their employees about the use of computers, networks and associated resources. These rules would state that not only just employees but users as well should not access the system areas where they are not authorized to, they would be held accountable for what all they do, they should only use to computer that was issued to them for purposes assigned to them, etc. These rules basically state that the computers are not to be used improperly or illegally during or after work hours at job sites. Verizon wireless “acceptable use policy” states that there should be no illegal use of their personal internet meaning that their services should only be used for lawful purposes only. This includes any unauthorized actions to illegal sites or violation of control laws. Their email use is prohibited for users to use illegally. NO commercial advertising or informational announcements are allowed. AT&T “acceptable use policy” prohibits any use of their services in any way illegally, unlawful, or harmful in any way to their company or any other company. Their AUP also doesn’t want any unauthorized access to pornography sites, inappropriate interaction with minors or threatening of material or contents. AT&T email services are not to be used for inappropriate emails or messages. Cox Communication email prohibits sending any unsolicited mail messages. Commercial advertising and informational email is spamming and prohibited as well. Their services are not to be used illegally for any purposes by users or employees. All three of these companies basically have the same laws/rules which from reading up on other companies are all the same but just worded differently.…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    * This policy applies to all computers that are connected to the network via a physical network connection, a wireless connection, a connection through the modem pool, or a VPN connection.…

    • 1030 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Privacy is a topic that is now on the hot plate more than ever. With the U.S. government’s recent violations in the name of national security many are starting to ask where the line is. There is a reasonable expectation of privacy as we go about our daily lives. From work to personal time, we each expect a certain amount of privacy. Employees expect to give up some of this privacy while in the work place to meet their obligations. Examples of such would be fewer phone calls and less social time to allow for a higher production yield. Companies however, believe they are within their right to control what their employees do outside of work as well. Especially if these actions have an effect on the company’s production, safety and reputation.…

    • 926 Words
    • 4 Pages
    Better Essays
  • Good Essays

    chap13

    • 1109 Words
    • 5 Pages

    Visitors may not have access to confidential documents, nor the company electronic devices, nor can access to the company intranet or making use of it with their own cell phones, laptops, iPads or any electronic device.…

    • 1109 Words
    • 5 Pages
    Good Essays
  • Good Essays

    4. Each of the following is a successive layer in which information security is achieved except _______.…

    • 3457 Words
    • 14 Pages
    Good Essays
  • Better Essays

    Banks should also consider divulging informationto customers when wireless Internet devices that require the use of communications protocols deemed insecure will no longer be supported by the institution. The financial institution should consider having regular independent security testing performed on its wireless customer access application. Specific testing goals would include the verification of appropriate security settings, the effectiveness of the wireless application security implementation and conformity to the institution 's stated standards. The security testing should be performed by an organization that is technically qualified to perform wireless testing and demonstrates appropriate ethical…

    • 1375 Words
    • 6 Pages
    Better Essays
  • Good Essays

    If your Bluetooth enabled equipment asks for you to enter your pin after you have initially paired it, you must refuse the pairing request and report it to Infosec, through your Help Desk, immediately.…

    • 644 Words
    • 3 Pages
    Good Essays