Preview

unit 4 assignment 2

Satisfactory Essays
Open Document
Open Document
303 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
unit 4 assignment 2
NT2580 Unit 4
10/9/2013
Assignment 2
After research and careful consideration of some of the other policies listed by other companies such as AT&T, Sprint, T-Mobile, and Verizon Wireless, Richman Investments has come up with the an acceptable use policy (AUP). The following are not allowed at any time: Making of unauthorized promises in e-mail. All emails should have a footer which states that the messages are from the sender only and do not represent the decisions or policies of Richman Investments. Using company resources or web services to visit web sites which contain inappropriate material is prohibited. This includes pornography, sexually oriented material, or sites which promote or depict discrimination, violence, or illegal activities. In addition, it is no longer allowed to have big attachments to multiple recipients in the organization will be enforced. This can tie up the system during a busy point in the day which could end up keeping the company from making profitable decisions. In addition, no jokes or humorous items on Richman Investments email system. These emails may not be considered funny to some, therefore will not be allowed by any. Making statements concerning race, sexual orientation, disability, religion, or national origin are prohibited. These statements could be seen as harassment by either the person receiving it or by other people that may see it. Use of company email to support inappropriate activities is not allowed. Checking a doctor’s appointment is fine, running a side-business is not. Using non-standard spelling and grammar is also prohibited. In addition to those items listed above, personal downloads are to be strictly prohibited. If you should have need of a program or utility which is not accessible in your computer system, then you must submit a request to the IT department identifying the service or application requested, why the application is needed.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware, which spread to the network server. The security officer at Richman has asked you to research and to define “the acceptable use of Richman assets regarding Internet and e-mail access,” including the actions that are prohibited. The employees must be restricted from using the Internet at work for personal use, other than to occasionally check Web-based personal e-mail accounts. Personal downloads must be strictly prohibited. Your definition will become part of the overall Richman security policy.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 1

    • 128 Words
    • 1 Page

    Do you have a DNS Server set up with your company? If so, what kind?…

    • 128 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 1

    • 383 Words
    • 2 Pages

    Video Connectors – Video Graphics Adapter (VGA), Digital Video Interface (DVI), and S-Video (TV connection)…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 349 Words
    • 1 Page

    IP route: One entry in an IP routing table that lists some potential destination (usually a network ID or subnet ID) as forwarding instructions, including the interface out which the router should forward the IP packet.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    The purpose of this policy is to define standards for connecting to Richman investment’s network from any host. These standards are designed to minimize the potential exposure to Richman investments from damages which may result from unauthorized use of Richman investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman investments internal systems, etc.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 299 Words
    • 1 Page

    The evolution of the Ethernet standards will have a large effect on data storage requirements. As the speeds of these connections continue to increase, users and businesses will be able to transfer larger files faster and will required larger data storage to accommodate the increased demand of resources. Thirty years ago, when the standard was only 10MB, there was nowhere near the need for the data storage capacity as there is today, with the current standard being 100 Gbit, with 1 Tbit on the way. Data storage wasn’t as high in demand before because it would take an extremely long amount of time to transfer large files, but as the speed increases, so will the demand.…

    • 299 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 1

    • 310 Words
    • 1 Page

    5. How long do you think it will take before the IPv4 addresses are completely exhausted? It could possibly become exhausted within the next two years or so.…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Richman Investments is the name for its installation of the Richman Investments software from Jive Software creating a virtual (type of company) community. It is a Web-based virtual community where members collaborate on documents, share insight and best practices and exchange ideas.…

    • 896 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unit 5 Assignment 1

    • 1034 Words
    • 5 Pages

    There are many avenues that the fire service can utilize to reduce the injuries, deaths, cost and risks that fire poses to firefighters and those in the community. Among these numerous avenues that are at the fire service’s disposal, in my opinion, the most effective is the presence of fire suppression systems in homes. With that being said, I’m in support of requiring the installation of fire sprinklers in homes, for while there may be an initial financial hit, there are far more pros than cons; such as reducing injury, death and cost of fires.…

    • 1034 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Unit 7 Assignment 3

    • 409 Words
    • 2 Pages

    Structuration Theory is a social theory based on several Theorists throughout time but notably Anthony Giddens. Basically Structuration Theory of our social systems stating that both structure and agents are equal in how we interact socially.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This email is to announce a new acceptable email use policy that will take effect on 1 April 2011. All personnel, to include but not limited to employees, consultants, and others working with the company, who use the company’s email system, are required to comply with this policy statement. This policy is to inform all employee’s, within the company, how they are expected to use their company email accounts and what would constitute as misuse in your day-to-day working activities.…

    • 803 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security Letter

    • 294 Words
    • 2 Pages

    * Employees are permitted to use email for occasional and reasonable personal use, subject to the terms in this policy.…

    • 294 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    As a user of Sporting Needs computer equipment and information technology resources, you are responsible for exercising good judgment in its use in accordance with Sporting Needs standards, guidelines, and policies. 4.1.2. Users are not to use Sporting Needs computer equipment and information technology resources for any illegal or unauthorized purpose. Examples include but not limited to: 4.1.2.1. Distributing and downloading pirated data or software.…

    • 2122 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Ict Acceptable Use Policy

    • 5292 Words
    • 22 Pages

    Change Approval The ICT Acceptable Use Policy is reviewed regularly and amended as necessary. The Information Security Forum will agree significant changes to the policy.…

    • 5292 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    Ethics in Cyberspace

    • 1058 Words
    • 5 Pages

    AUPs are available on the Internet at gopher sites and can be retrieved by using…

    • 1058 Words
    • 5 Pages
    Powerful Essays