Access Control Policy

Topics: Virtual private network, Internet, Cable modem Pages: 4 (1119 words) Published: August 22, 2013
IT-255 unit 3 assignment 1
1.0 Purpose
The purpose of this policy is to define standards for connecting to 's network from any host. These standards are designed to minimize the potential exposure to from damages which may result from unauthorized use of resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical internal systems, etc. 2.0 Scope

This policy applies to all employees, contractors, vendors and agents with a -owned or personally-owned computer or workstation used to connect to the network. This policy applies to remote access connections used to do work on behalf of , including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc. 3.0 Policy

3.1 General
1. It is the responsibility of employees, contractors, vendors and agents with remote access privileges to 's corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to . 2. General access to the Internet for recreational use by immediate household members through the Network on personal computers is permitted for employees that have flat-rate services. The employee is responsible to ensure the family member does not violate any policies, does not perform illegal activities, and does not use the access for outside business interests. The employee bears responsibility for the consequences should the access be misused. 3. Please review the following policies for details of protecting information when accessing the corporate network via remote access methods, and acceptable use of 's network: a. Acceptable Encryption Policy

b. Virtual Private Network (VPN) Policy
c. Wireless Communications Policy
d. Acceptable Use Policy
4. For additional information...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • remote access control policy Essay
  • Access Control Policy Essay
  • Access Control FInal Project Essay
  • Access Control Policy Essay
  • Essay on Security Policy for a Small House or Business
  • Aup Policy Essay
  • Unit 10 Assignment 1: Controls Essay
  • The Role Of Information Security Policy Essay

Become a StudyMode Member

Sign Up - It's Free