Enhance and Existing It Security Policy Framework Essay Example
This document is designed to provide definition of the standards for connecting remotely to Richman Investments’ network outside of the company’s direct network connection. The standards defined here are designed to mitigate exposure to potential damage to Richman Investments’ network, resulting from the use of unauthorized use of network resources. Scope: All Richman Investments agents, vendors, contractors, and employees, who use either Richman Investments company property or their own personal property to connect to the Richman Investments network, are governed by this policy.
The scope of this policy covers remote connections, used to access or do work on behalf of Richman Investments, including, but not limited to, the viewing or sending of e-mail, and the viewing of intranet resources. Policy: Richman Investments agents, vendors, contractors, and employees with privilege to remote access to Richman Investments’ corporate network are responsible for ensuring that they adh
...ere to these standards, whether using company-owned or personal equipment for data access, and that they follow the same guidelines that would be followed for on-site connections to the Richman Investments network.
General access to the Internet by household members via the Richman Investments network will be permitted, and should be used responsibly, such that all Richman Investments standards and guidelines are enforced for the duration of Internet activity. The Richman Investments agent, vendor, contractor, or employee will bear any responsibilities and consequences for any misused access. Requirements:
- Remote access must be secure and strictly controlled. Enforcement of control will be via password authentication or private/public keys with strong pass-phrases.
- Richman Investments employees should, at no time, provide their security password(s) to another individual, including family members.
- An up-to-date anti-virus software package must be used
on all hosts connected to Richman Investments’ networks remotely, which includes personal equipment. Should personal equipment be used to connect to Richman Investments’ networks remotely, that equipment must meet the requirements that equipment otherwise owned by Richman Investments would meet.
Enforcement: Violations of this policy by any agent, vendor, contractor, or employee will be subject to disciplinary action, including the possibility of separation of duty from Richman Investments.
- Networking essays
- Telecommunication essays
- Network Topology essays
- Telecommunications essays
- Email essays
- Hypertext Transfer Protocol essays
- Marshall Mcluhan essays
- Virtual Learning Environment essays
- Web Search essays
- Etiquette essays
- Mainstream essays
- Vodafone essays
- Web Search Engine essays
- Internet Privacy essays
- Cyber Security essays
- Android essays
- Application Software essays
- Benchmark essays
- Computer Network essays
- Computer Programming essays
- Computer Security essays
- Computer Software essays
- Cryptography essays
- Data collection essays
- Data Mining essays
- Graphic Design essays
- Information Systems essays
- Internet essays
- Network Security essays
- Website essays
- World Wide Web essays
- American Dream essays
- Barriers To Entry essays
- Capitalism essays
- Central Bank essays
- Compensation essays
- Consumerism essays
- Economic Development essays
- Economic Growth essays
- Economic Inequality essays
- Economic System essays
- Economy essays
- Employment essays
- Export essays
- Finance essays
- Free Trade essays
- Gross Domestic Product essays
- Human Development essays
- Income Inequality essays
- Industry essays