Preview

NT 2799 Remote Access Policy

Good Essays
Open Document
Open Document
848 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT 2799 Remote Access Policy
Remote Access Policy
1. Overview
See Purpose.
2. Purpose
The purpose of this policy is to define standards for connecting to Corona District High School's network from any host. These standards are designed to minimize the potential exposure to Corona District High School from damages which may result from unauthorized use of Corona District High School resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Corona District High School internal systems, etc.

3. Scope
This policy applies to all Corona District High School employees, contractors, vendors and agents with a Corona District High School-owned or personally-owned computer or workstation used to connect to the Corona District High School network. This policy applies to remote access connections used to do work on behalf of Corona District High School, including reading or sending email and viewing intranet web resources.

Remote access implementations that are covered by this policy include, but are not limited to DSL, VPN, SSH.

4. Policy
It is the responsibility of Corona District High School employees, contractors, vendors and agents with remote access privileges to Corona District High School's corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to Corona District High School.

General access to the Internet for recreational use by immediate household members through the Corona District High School Network on personal computers is permitted. The Corona District High School employee is responsible to ensure the family member does not violate any Corona District High School policies, does not perform illegal activities, and does not use the access for outside business interests. The Corona District High School employee bears responsibility for the consequences should the access be misused.

Please review the following policies for

You May Also Find These Documents Helpful

  • Better Essays

    concern of this domain. This domain needs to be protected by securing the physical access to computer rooms and a disaster recovery plan (DRP) should be created including the backup of data. Plan, configure, maintain, and improve all network servers and implements all standards including the Acceptable Use Policy…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Scope this policy applies to all Richman Investments employees, contractors, vendors and agents with a Richman Investments-owned or personally-owned computer or workstation used to connect to the Richman Investments network. This policy applies to remote access connections used to do work on behalf of Richman Investments, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to: frame relay, DSL, ISDN, SSH, VPN, dial-in modems, and cable modems, etc.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Paquet, C. (2013, February 5). Security Policies > Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    5. Name at least 3 remote access protections or security controls that must be in place to provide secure remote access.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    For the remote access domain, we need to make sure the VPN in use is secure so that our employees are not exposing sensitive data to anyone outside the network. In order to do so we will ensure everyone is using a VPN to access the network which has to authenticate to the system to get authorization.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The user domain contains the employees that will be accessing resources in the network. Users access systems, applications, and data within the rights and privileges defined by the acceptable use policy. The AUP must be followed at all time or the user may be terminated. There are threats ranging from lack of awareness to blackmail and extortion. All employees are responsible for their own actions when using the network. The users will all be expected to read and abide by the acceptable use policy. (Kim & Solomon, 2012)…

    • 539 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    This policy applies to all Richman investments employees, contractors, vendors and agents with a Richman investments-owned or personally-owned computer or workstation used to connect to the Richman investments network. This policy applies to remote access connections used to do work on behalf of Richman investments, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    If your computer is a part of business, you should follow the policy established by network administrator.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    In the given network diagram, several domains need to be considered. This diagram includes the User, Workstation, LAN, and LAN-to-WAN domains. Security controls and their implementation are discussed below.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    This policy applies to all IDI Stakeholders, Committees, Departments, Partners, Employees of IDI (including system support staff with access to privileged administrative passwords), contractual third parties and agents of the Council with any form of access to IDI’s information and information systems.…

    • 1356 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Project for IS3350

    • 588 Words
    • 3 Pages

    You will gain an understanding of the aspects involved in the conception, enforcement, and implementation of security policies. You will also gain insight to risk analysis and will learn how to respond to any given situation that might arise from a violation of those security policies.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Tda 2.8 1.1

    • 1256 Words
    • 6 Pages

    • that users may only access the school’s networks through a properly enforced password protection policy,…

    • 1256 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    It 255

    • 629 Words
    • 3 Pages

    3. Incidental personal use of electronic mail, Internet access, fax machines, printers, and copiers is restricted to Richman Investments approved users…

    • 629 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The policies at the home I work in are the same as those above, and to ensure all employees are up to date with these policies and legislations, we are required to complete an e-learning program every 12 months…

    • 1049 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Children 's Internet Protection Act (CIPA). (n.d.). Retrieved January 17, 2012, from American Library Association: http://www.ala.org/ala.aboutala/offices/oif/iftoolkit/ALA…

    • 800 Words
    • 4 Pages
    Good Essays