Preview

course project ITT

Powerful Essays
Open Document
Open Document
4392 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
course project ITT
A TECHNOLOGY COMPANY DOD CYBER SECURITY POLICY INTRODUCTION:
Information technology continues to expand in use and importance throughout all aspects of life and A Technology Company (ATC). It is an indispensable tool for education, and research and plays a central role in the overall life of ATC.
PURPOSE:
The uses of information technology have changed dramatically over the last twenty years, and it is likely that the rate of change will accelerate in the future. For these reasons, it is critical that A Technology Company articulate a clear statement regarding the appropriate uses of our information technology resources and institute safeguards to ensure that our technology is secure, reliable, and available for the all employees of ATC.
SCOPE:
This document will cover the acceptable use of all IT resources on the ATC network in compliance with DoD Standards and Compliance Laws. This policy will be in effect for all employees of ATC, including but not limited to; Contractors, Vendors & any person with access to ANY ATC IT resource.
ACCEPTABLE USE POLICY:
By signing this policy you acknowledge and consent that when you access ANY ATC IT Resource:
1. I will use ATC IT Resources (computers, systems, and networks) only for authorized purposes.
2. I will not try to access data or use operating systems or programs, except as specifically authorized.
3. I know I will be issued a user identifier (user ID) and a password to authenticate my ATC.com account. After receiving them—
a. I will not allow anyone else to have or use my password. If I know that my password is compromised, I will report to my ATC Information System Security (ISS) Team for a new one.
4. I will not run “sniffers” (utilities used to monitor network traffic, commonly used to Spy on other network users and attempt to collect their passwords) or any hacker-related software on my IT system, or network.
5. If I observe anything on the system I am using that indicates inadequate

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 1 Assignment 1

    • 1252 Words
    • 6 Pages

    Companies use information as a weapon in the battle to increase productivity, deliver quality products and services, maintain customer loyalty, and make sound decisions. Information technology can mean the difference between success and failure…

    • 1252 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    This policy applies to all IDI Stakeholders, Committees, Departments, Partners, Employees of IDI (including system support staff with access to privileged administrative passwords), contractual third parties and agents of the Council with any form of access to IDI’s information and information systems.…

    • 1356 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    The following guidelines are expected to be upheld by all staff and employees, without exception:…

    • 1402 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 4104 Words
    • 17 Pages

    Information Technology (IT) is a set of tools, processes and methodologies (such as coding, programming, data communications, data conversion, storage and retrieval, system analysis and design, systems control) and associated equipment employed to collect, process, and present information. In broad terms, IT also includes office automation, multimedia and telecommunications. It is defined as the technology used involving the development, maintenance, and use of computer systems, software, and networks for the processing and distribution of data. IT is a broad subject concerned with all aspects of managing and processing information, especially within a large organization or company. Because computers are central to information management,…

    • 4104 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    • Defines strict access control policies, standards, procedures, and guidelines. Implement second-level identity check to gain access to sensitive systems, applications, and data.…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Technology, IT, is an integral property in a business’ success. In order for an organization to reach its maximum potential this organization will need to be coordinated and integrated. For as the organization moves on to higher levels of integration it will find many potential benefits to be gained.…

    • 432 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Course Project

    • 829 Words
    • 4 Pages

    Oracle is one of the leading companies in the software and hardware industry. Oracle develops, manufactures and distributes various kinds of software and hardware systems worldwide. The company was founded in 1977 and is headquartered in Redwood City, California. Oracle currently has about 108,000 full-time employees worldwide.…

    • 829 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Acceptable Use Policy

    • 1915 Words
    • 8 Pages

    Purpose. The purpose of this Acceptable Use Policy is to provide guidelines which will be applied in determining acceptable use of this Web site, and to notify you of the terms of this service. As a user of this service, you agree to comply with this policy, the stated acceptable uses and the terms of service.…

    • 1915 Words
    • 8 Pages
    Better Essays
  • Better Essays

    IS 3350: Policy Report

    • 1146 Words
    • 5 Pages

    The purpose of this policy is to understand what needs to be done with documents that contain…

    • 1146 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Such correct use includes the re-registration/renewal notifications, special offers and surveys, conducted with the purpose of the improvement of our service.Payment Information:If you are register to use the Service provided by inetsack, you will be required to enter proper credit card information, or other payment information, which is necessary for the completion of the payment process. inetsack may use a third party to process and verify the information you have provided for billing purposes. This requires the sharing of the user name, credit card number, expiration date and the billing address with the credit card processing company. When a payment transaction is being processed, inetsack is also eligible to obtain any information regarding the amount needed for the successful completion of the transaction, as well as other data. We may transfer or disclose the stated payment information to a third party, only when it…

    • 1057 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Faa Fsims

    • 310 Words
    • 2 Pages

    • enhance standardization by accessing the same version of policy and guidance as other FAA employees…

    • 310 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Use of IT changed a lot in the work environment. It has not only enhanced the efficiency of work but also become the most effective tool for communication. E-mail and VOIP are some of the examples of IT tool. However, to address this new phenomenon, organizations have to initiate new policies as well, e.g. IT Policy.…

    • 781 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Memo Sample

    • 324 Words
    • 2 Pages

    The company will not tolerate any employee downloading or uploading unauthorized software from the Internet.…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mis in Restaurant

    • 4079 Words
    • 17 Pages

    The use of Information Technology helps firms in making their services much better and makes works easier. With computers being part of our day to day lives and as omnipresent as they are today, there’s hardly any business that does not rely extensively on information technology systems. Every organization has a pool of valuable information which is used for further processing. That’s why managing information into a systematic way is important.…

    • 4079 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Information technologies (IT) are vital to Company operations. They are tools that improve the quality and efficiency of our work. They are the repositories for critical and sometimes highly proprietary corporate information. The improper access to or the destruction of these resources will have serious consequences for the Company. The strategic use of information technology can help organizations increase their competitive advantage and make considerable improvements in operating performance.…

    • 301 Words
    • 2 Pages
    Good Essays