Preview

unit 4 assignment 2

Satisfactory Essays
Open Document
Open Document
303 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
unit 4 assignment 2
NT2580 Unit 4
10/9/2013
Assignment 2
After research and careful consideration of some of the other policies listed by other companies such as AT&T, Sprint, T-Mobile, and Verizon Wireless, Richman Investments has come up with the an acceptable use policy (AUP). The following are not allowed at any time: Making of unauthorized promises in e-mail. All emails should have a footer which states that the messages are from the sender only and do not represent the decisions or policies of Richman Investments. Using company resources or web services to visit web sites which contain inappropriate material is prohibited. This includes pornography, sexually oriented material, or sites which promote or depict discrimination, violence, or illegal activities. In addition, it is no longer allowed to have big attachments to multiple recipients in the organization will be enforced. This can tie up the system during a busy point in the day which could end up keeping the company from making profitable decisions. In addition, no jokes or humorous items on Richman Investments email system. These emails may not be considered funny to some, therefore will not be allowed by any. Making statements concerning race, sexual orientation, disability, religion, or national origin are prohibited. These statements could be seen as harassment by either the person receiving it or by other people that may see it. Use of company email to support inappropriate activities is not allowed. Checking a doctor’s appointment is fine, running a side-business is not. Using non-standard spelling and grammar is also prohibited. In addition to those items listed above, personal downloads are to be strictly prohibited. If you should have need of a program or utility which is not accessible in your computer system, then you must submit a request to the IT department identifying the service or application requested, why the application is needed.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 3 Assignment 1

    • 128 Words
    • 1 Page

    Do you have a DNS Server set up with your company? If so, what kind?…

    • 128 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    * Messages often contain attachments that exploit weaknesses in client-side applications, or links to websites that exploit vulnerabilities in Web browsers or browser plug-ins.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 1

    • 383 Words
    • 2 Pages

    Video Connectors – Video Graphics Adapter (VGA), Digital Video Interface (DVI), and S-Video (TV connection)…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 349 Words
    • 1 Page

    IP route: One entry in an IP routing table that lists some potential destination (usually a network ID or subnet ID) as forwarding instructions, including the interface out which the router should forward the IP packet.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    The purpose of this policy is to define standards for connecting to Richman investment’s network from any host. These standards are designed to minimize the potential exposure to Richman investments from damages which may result from unauthorized use of Richman investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman investments internal systems, etc.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 299 Words
    • 1 Page

    The evolution of the Ethernet standards will have a large effect on data storage requirements. As the speeds of these connections continue to increase, users and businesses will be able to transfer larger files faster and will required larger data storage to accommodate the increased demand of resources. Thirty years ago, when the standard was only 10MB, there was nowhere near the need for the data storage capacity as there is today, with the current standard being 100 Gbit, with 1 Tbit on the way. Data storage wasn’t as high in demand before because it would take an extremely long amount of time to transfer large files, but as the speed increases, so will the demand.…

    • 299 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    XCOM 285 week x

    • 501 Words
    • 4 Pages

    Determine if the content is appropriate for a workplace setting. If it is, explain why. If not, identify the errors made and rewrite the e-mail, to be appropriate.…

    • 501 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Richman Investments is the name for its installation of the Richman Investments software from Jive Software creating a virtual (type of company) community. It is a Web-based virtual community where members collaborate on documents, share insight and best practices and exchange ideas.…

    • 896 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Leg 500 Assignment 1

    • 939 Words
    • 4 Pages

    Emails are something that’s getting sent on a daily basis all day every day. With having to set up email accounts, which ask for your social security numbers are basically your fingerprint, is an open door for people to find out any information they want to about you. Typically, some companies use company email addresses for memos that need to get to employees or company executives or any personal emails that need to be shared. With company emails come company email policies that will explain why the emails were provided and what is not acceptable content to pass through email. In the Michael A. Smyth v. The Pillsbury Company case, Mr. Smith and another employee were terminated for exchanging emails that made threats to sales managers and made rude comments about certain company events. Mr. Smith sued the Pillsbury Company for violating public policy by committing a tort known as “invasion of privacy”. In the policy, Pillsbury stated that all employee emails were going to remain confidential and privileged including plaintiff. On these grounds, Smith thought he had a case against the Pillsbury Company, but as the defendant (Pillsbury) pointed out, the company wants to keep their employees safe so the frequent email checks to ensure that…

    • 939 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unit 5 Assignment 1

    • 1034 Words
    • 5 Pages

    There are many avenues that the fire service can utilize to reduce the injuries, deaths, cost and risks that fire poses to firefighters and those in the community. Among these numerous avenues that are at the fire service’s disposal, in my opinion, the most effective is the presence of fire suppression systems in homes. With that being said, I’m in support of requiring the installation of fire sprinklers in homes, for while there may be an initial financial hit, there are far more pros than cons; such as reducing injury, death and cost of fires.…

    • 1034 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware, which spread to the network server. The security officer at Richman has asked you to research and to define “the acceptable use of Richman assets regarding Internet and e-mail access,” including the actions that are prohibited. The employees must be restricted from using the Internet at work for personal use, other than to occasionally check Web-based personal e-mail accounts. Personal downloads must be strictly prohibited. Your definition will become part of the overall Richman security policy.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    As a user of Sporting Needs computer equipment and information technology resources, you are responsible for exercising good judgment in its use in accordance with Sporting Needs standards, guidelines, and policies. 4.1.2. Users are not to use Sporting Needs computer equipment and information technology resources for any illegal or unauthorized purpose. Examples include but not limited to: 4.1.2.1. Distributing and downloading pirated data or software.…

    • 2122 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Security Letter

    • 294 Words
    • 2 Pages

    * Employees are permitted to use email for occasional and reasonable personal use, subject to the terms in this policy.…

    • 294 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ethics in Cyberspace

    • 1058 Words
    • 5 Pages

    AUPs are available on the Internet at gopher sites and can be retrieved by using…

    • 1058 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Ict Acceptable Use Policy

    • 5292 Words
    • 22 Pages

    Change Approval The ICT Acceptable Use Policy is reviewed regularly and amended as necessary. The Information Security Forum will agree significant changes to the policy.…

    • 5292 Words
    • 22 Pages
    Powerful Essays