Preview

Security Audit Policy

Powerful Essays
Open Document
Open Document
1938 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Audit Policy
Computer and Internet-Usage Policy for BPIK, LLC
Computer Investigations and Forensics

Overview
The computer, network and information resources at BPIS, LLC are provided as a means to increase productivity to support the mission of the BPIS, LLC's employees. Usage of computing and networking components by employees of BPIS, LLC should at all times be business related and reflect good judgment in the utilization of shared resources and take heed to the ethical and legal guidelines of society. This document details BPIS, LLC'c acceptable usage of all computing and network resources.

The internet is a ever expanding worldwide network of computers and servers containing millions of pages of information. Users are cautioned that many of these pages include offensive, sexually explicit, and inappropriate material. It is understandable that sometimes it is difficult to avoid contact with said material while using the internet. Often times an innocent web search may lead to web pages with offensive material. Also, the usage of email on the internet may lead to the receipt of unwarranted mail with offensive and/or malicious content.

This document details the employees (hereinafter referred to as “user” or “users”) privileges and responsibility as well as the guidelines and procedures for the responsible use of BPIS, LLC computer system and networks. It was designed to allow for the proper usage and management of these systems, protect company assets, ensure reasonable access, and provide guidelines for accountability. This policy applies not only to BPIS, LLC computers and network, but also to computers and/or devices attached to BPIS, LLC's network in any way.

Definitions
In order to avoid ambiguous language, the following are definitions applied to terms used through this documentation.

A. User – Any employee of BPIS, LLC be it temporary or full time who uses the company's computer or network facilities

B. Authorized User – Anyone who

You May Also Find These Documents Helpful

  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Which departments will need what permissions as far as access to computers, printers, and scanners?…

    • 335 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Good Essays

    Assignment 4 Nt2580

    • 485 Words
    • 2 Pages

    3. Below are the following policies for details of protecting information when accessing the corporate network when referencing the remote access methods, and acceptable use of Richman Investment's network:…

    • 485 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 697 Words
    • 3 Pages

    Some employees are using the company networks to access the Internet. Some expect the company to provide this type of access. This presents a number of challenges to company network management. Identify three challenges and suggest strategies for a company to address these challenges.…

    • 697 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Project Part 1

    • 1209 Words
    • 4 Pages

    This Proposal is to assess the situation at the Richman Investments Company. The offices have a total of 5,000 employees, and the office technology inventory includes desktops, mobile computers, and wireless devices. There is a mix of computers running Windows XP, Windows Vista, Windows 7, and Mac OS X. Most of the managers have BlackBerry devices for instant communication, and all employees are provided cell phones. A Windows Active Directory forest with domains is set up for each office, and seven file and print servers are located in the Phoenix office. The Phoenix office also contains two proxy servers, configured as an array, that provide Web cache services and Internet access control for the organization. The majority of applications are Web-based and hosted from the Phoenix office.…

    • 1209 Words
    • 4 Pages
    Better Essays
  • Good Essays

    NT2580

    • 940 Words
    • 4 Pages

    * Do not create unnecessary business risk to the company by misuse of the network, internet, or email services…

    • 940 Words
    • 4 Pages
    Good Essays
  • Better Essays

    IT policies and procedures in any organization provides a framework for appropriate and inappropriate use of computing and information resources (Winniford, et al, 2012). More specifically, the organization would have in writing that using a computer system without proper authorization granted through Briargrove’s Administration would have adverse actions on their…

    • 1283 Words
    • 6 Pages
    Better Essays
  • Good Essays

    This document establishes computer usage guidelines for the Regional ABC Credit union/bank Systems Division support staff in the course of their job duties on Regional ABC Credit union/bank Credit union/bank Computer Systems. These guidelines incorporate the elements of the Regional ABC Credit union/bank Systems Division Special Access Agreement and the Acceptable Use Statement of Regional ABC Credit union/bank Systems Division Computing Resources. These guidelines are intended to protect the rights and privacy of Regional ABC Credit union/bank Systems Division clients as well as those of Regional ABC Credit union/bank Systems Division support staff. Any Corporate Headquarters guidelines or policies will take precedence over these guidelines.…

    • 1260 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Although the internet can be a valuable tool both educationally and socially, there are some serious risks associated with using the internet and other technologies. As in the real world, children and young people are vulnerable and may knowingly or unknowingly expose themselves to danger when using the internet, mobile phones and other technologies.…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Regulating Pornography

    • 407 Words
    • 2 Pages

    Pornography is a serious problem that faces America's people today. A problem that jeopardizes our nation's moral and ethical values and is easily accessible for children and adults alike. Often times the young people accessing such websites in cyberspace aren't even old enough to understand the complete meaning of human sexuality. More often, the adults accessing these websites, who do have a common understanding of sexuality, begin to obtain distorted views of normal sexual behavior. In order to save our children's innocence and America's moral values, pornography should be strictly regulated on the internet.…

    • 407 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The internet is a wonderful learning tool. Of course like any good thing, the Internet comes with its ups and downs. There are several things that aren’t suitable for any child on the internet, such as pornography, violent material, adult content and more. Many people have experienced this trauma, and it is only getting worse…

    • 563 Words
    • 3 Pages
    Good Essays
  • Good Essays

    According to (Anthony Robbins, 2010) “The way we communicate with others and with ourselves ultimately determines the quality of our lives”. It is imperative that in any organization there needs to be a detailed and efficient flow of information. Communications is the key for a business to be successful, and it provides the solid foundation needed to construct a solid business process. One other very important part of communications in a company is the flow of that information which ultimately produces the results whether good or bad. This paper will describe how information is used and how it flows at Document Logistic Agency (DLA) Document Services Jacksonville in the IT department. It will also describe any concerns with properly controlling the information flow, including keeping it safe from unauthorized use.…

    • 977 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Introduction Objectives Objectives Upon completion of this chapter, you should be able to: Define security Describe Describe an information system and its components Define database management system functionalities Outline the concept of information security Identify the major components of information security architecture Define database security…

    • 1816 Words
    • 8 Pages
    Powerful Essays

Related Topics