Preview

Misuse Of Internet Policy Final 20May2015

Powerful Essays
Open Document
Open Document
1195 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Misuse Of Internet Policy Final 20May2015
Misuse of the Internet Policy
Introduction
The Company provides access to the information resources of the Internet to support employee success with their job function. The Internet is a tool, provided for employees. The Company expects its employees to use their Internet access primarily to research relevant topics and obtain useful information. Employees are expected to conduct themselves honestly and appropriately on the Internet, and respect copyrights, software licensing rules, property rights, privacy and rights of others. Unnecessary or unauthorized Internet usage causes network and server congestion. Unlawful Internet usage may also garner negative publicity towards CYB 603 Company and exposes significant legal liabilities. Employees must take special care to maintain the clarity, consistency and integrity of the Company image and posture. Employee actions on the Internet could be taken as representation of the Company. The CYB 603 Company connection to the Internet offers a wealth of potential benefits, it also open the door to some significant risks to our data and systems if appropriate security discipline are not followed. The overriding principle is that security is to be everyone’s job. Company employees can be held accountable for any breaches of security or confidentiality. It is the employees due diligence to report any misuse of the Internet to the Company.
Purpose.
The purpose of the Misuse of the Internet Policy is to outline CYB 603 Company’s acceptable use of the Internet. The Policy is in place to protect the CYB 603 and its employees. Use of the Internet whether for good or malicious conduct exposes the Company to risks including but not limited to virus, attacks, denial of service, data compromise, services and legal issues.
Organizational Roles and Responsibilities.
Key personnel including the CIO, ISO and Legal Representatives are outlined and described in the Organizational Roles and Responsibilities section of the CYB603 IT Policy.



References: California Penal Code § 502 (1979). Retrieved from http://leginfo.legislature.ca.gov/faces/codes_displaySection.xhtml?lawCode=PEN&sectionNum=502 Copyright Law of the United States (2011), 17 U.S.C Digital Millennium Copyright Act of 1998, Pub. L. No. 105-304, 112 Stat. 2860 (1998). Retrieved from http://www.gpo.gov/fdsys/pkg/PLAW-105publ304/pdf/PLAW-105publ304.pdf Prosecuting Computer Crimes. (2007). Retrieved from http://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf CYB603 Misuse of the Internet Policy Agreement

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware, which spread to the network server. The security officer at Richman has asked you to research and to define “the acceptable use of Richman assets regarding Internet and e-mail access,” including the actions that are prohibited. The employees must be restricted from using the Internet at work for personal use, other than to occasionally check Web-based personal e-mail accounts. Personal downloads must be strictly prohibited. Your definition will become part of the overall Richman security policy.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    • Compile and submit all previous weeks’ sections with this week’s Network Security Policy and Executive Summary sections as a final Information Security Policy (Appendix B).…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Liaskos, J., & Sandy, G. A. (2004). An evaluation of Internet use policies of Victorian local…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    UNV104

    • 999 Words
    • 4 Pages

    Internet abuse is an issue in the workplace. Statistics show the internet is being used for personal use during work hours. Extensive internet use causes a decrease in productivity and an increase in liability.…

    • 999 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Information Security Organization Provides information on the structure of the information security organization and individuals that fulfill the information security role Scope  This Information Security Policy applies to the City of Chicago, its departments, commissions, boards, offices, and agencies, and all officers, employees, temporary employees, interns, vendors, consultants, contractors and agents thereof--collectively referred to as ―User(s)‖. The principles set forth in this Policy are applicable to all information technology and assets, in all…

    • 2909 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Acceptable Use Policy

    • 725 Words
    • 3 Pages

    A Standard Operating Procedure (SOP) will be established to support the development and maintenance of this AUP. Richman Investments’ management team is responsible for keeping the AUP up to current standards and ensuring that new and current employees are kept abreast of major changes and that signatures are obtained from each employee following these changes. At a minimum, skills that should be included include annual User Training and Awareness. A formal review cycle will be established to review all Acceptable Use initiatives.…

    • 725 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Unit 5 Assignment 1

    • 1355 Words
    • 6 Pages

    Roles and responsibilities • Security roles and responsibilities of employees, contractors and third-party users should be defined and documented in accordance with the organization 's information privacy and security policies. This could include:…

    • 1355 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Civil and Criminal Law

    • 679 Words
    • 3 Pages

    References: Radcliffe, M., & Brinson, D. (1999). Copyright Law. Retrieved on November 10, 2008, from http://library.findlaw.com/1999/Jan/1/241476.html…

    • 679 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Web page and search engines are very helpful and can provide a lot of information at an employee’s fingertips, however if these programs are not monitored they can be abused by personal use of employees. Managers and other department supervisors should monitor the use of email, instant messaging, web pages, and search engines because it is important to…

    • 346 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Information Security Policy

    • 3396 Words
    • 14 Pages

    Sunica Music and Movies is a company that currently has four locations. This business is ready to improve the way they do business by implementing a computerized network that will allow for centralized accounting and inventory as well as starting a web-based e-commerce site. The following document provides an in-depth look at the implementation of policy and procedures that will help this transition to become successful.…

    • 3396 Words
    • 14 Pages
    Best Essays
  • Satisfactory Essays

    Intellectual property might be a firm’s biggest asset. It's extremely important that the organization defend the property and restrict harms which may happen in case the property is thieved or duplicated. The main topic of today’s debate will entail “Legal Problems in Cyberspace”, and “Copyright Violation.” The debate will incorporate the way the problems correspond with the participants' selected fields. The members will also talk about the fields that they ar...…

    • 405 Words
    • 2 Pages
    Satisfactory Essays

Related Topics