Remote Access Standards for Richman Investments

Better Essays
Topics:
Remote Access Standards for Richman Investments Remote Access Standards for Richman Investments
Purpose:
This document is designed to provide definition of the standards for connecting remotely to Richman Investments’ network outside of the company’s direct network connection. The standards defined here are designed to mitigate exposure to potential damage to Richman Investments’ network, resulting from the use of unauthorized use of network resources.
Scope:
All Richman Investments agents, vendors, contractors, and employees, who use either Richman Investments company property or their own personal property to connect to the Richman Investments network, are governed by this policy. The scope of this policy covers remote connections, used to access or do work on behalf of Richman Investments, including, but not limited to, the viewing or sending of e-mail, and the viewing of intranet resources.
Policy:
Richman Investments agents, vendors, contractors, and employees with privilege to remote access to Richman Investments’ corporate network are responsible for ensuring that they adhere to these standards, whether using company-owned or personal equipment for data access, and that they follow the same guidelines that would be followed for on-site connections to the Richman Investments network. General access to the Internet by household members via the Richman Investments network will not be permitted, and should be used responsibly, such that all Richman Investments standards and guidelines are enforced for the duration of Internet activity. The Richman Investments agent, vendor, contractor, or employee will bear any responsibilities and consequences for any misused access.
Unacceptable Use:
The following activities are, in general, prohibited. Employees may be exempted from these restrictions during the course of their legitimate job responsibilities (e.g., systems administration staff may have a need to disable the network access of a host if that host is



References: City of Lathrop. (2011). City of Lathrop Acceptable Use Policy. Lathrop: City Of Lathrop. Jacobs Engineering Group. (2012). JEG Acceptable Use Policy. Sacramento: Jacobs Engineering Group INC. Sans Insitute. (2006). Acceptable Use Policy. Retrieved from http://www.sans.org: http://www.sans.org/security-resources/policies/Acceptable_Use_Policy.pdf

You May Also Find These Documents Helpful

  • Good Essays

    Remote Access

    • 496 Words
    • 2 Pages

    Richman Investments To: Senior Manager From: Intern Good day to you and anyone reading this correspondence. I have been tasked by the IT security team to draft a Remote Access Standard to be implemented within the current security infrastructure. Knowing the types of things that could come about from insecure resources I’d like to offer a solution to issues that may come about from using process like VPN and remote access for people that telework into the office from home. Having multiple…

    • 496 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Remote Access Control Policy for Richman Investments Authorization- Richman Investments must define rules as to who has access to which computer and network resources. My suggestion is that RI implements either a group membership policy or an authority-level policy to achieve this. Group policy would allow the administrator to assign different privileges to different groups. The admin would then assign different individual users to those different groups. So the users permissions would depend…

    • 302 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Remote Access

    • 1553 Words
    • 7 Pages

    Remote Access Remote access • refers to the ability to access a computer, such as a home computer or an office network computer, from a remote location. • Remote access can be set up using a local area network (LAN), wide area network (WAN) or even a virtual private network (VPN) so that resources and systems can be accessed remotely. • To establish a remote connection, both the local machine and the remote computer/server must have remote-access software. Alternatively, there are service providers…

    • 1553 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    The Multi-Layered Security Plan for Richman Investments are as follows. 1. All laptops and desktops should be running Windows 7. Windows XP will not be supported after May 2014. Also, they should be running some type of Anti-Virus software and laptops should be encrypted in case of the laptop being stolen. (Dell, 2011) 2. Patching the servers, desktops and laptops often. Most software applications have updates to their software for security updates. Microsoft sends out patches every second…

    • 746 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    General 1. It is the responsibility of Richman Investments employees, third party contractors, vendors and agents with remote access privileges to Richman Investments' networks to ensure that their remote access connection is given the same consideration as the user's on-site connection to the company. 2. General access to the Internet for recreational use by employees is discouraged through the Richman Investments Network. Employees of Richman Investments are responsible to ensure they do not violate…

    • 254 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    remote access policy

    • 464 Words
    • 2 Pages

    Remote access policy Purpose The purpose of this policy will provide the standards for connecting to any DoD networks from any host. These standards are created and designed to minimize any potential exposure to DoD network (s) from damage which may result from unauthorized user or access of DoD networks. Damages include loss of confidential or sensitive data, intellectual data, and damage to critical DoD internal systems. Scope This policy will apply to all DoD employees, contractors, vendors…

    • 464 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Richman Investments “Internal Use Only” Data Classification Standard Due to the general nature of employees having access to systems, applications, and data depending upon their defined access rights, employees must conform to staff manuals and policies described within this document. The “Internal Use Only” data classification standards at Richman Investments will include the most basic of IT Infrastructure Domains to include User Domain, Workstation Domain, and LAN Domain. This will encompass…

    • 1007 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Dear Richman Investments, I have reviewed your needs and circumstances and have designed a remote access control policy that will work for you and your company. This is a multi-layered security system that consists of the user’s domain. The user is the first and the weakest link in any system. The security is only as strong as the user’s ability to understand what can go wrong. We can implement a training program session for security awareness. Another security measure is to implement a policy…

    • 775 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    remote access it255

    • 345 Words
    • 2 Pages

    Write a remote access security policy covering the most important security risk. 1) Wireless Access When the network is accessed remotely via wireless appropriate wireless security standards will be used. • Wired Equivalency Protocol (WEP) will be used as standard on Wi-Fi connections. • A WEP encryption key will be used. • The network will be configured not to advertise its presence. • The power of access points will be turned down to a minimum that still allows the access point…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Richman Investments "Internal Use Only" Data Classification Standard The "Internal Use Only" data classification standard at Richman Investments will include the most basic IT infrastructure domains to include the User Domain, Workstation Domain, and the LAN Domain. This will encompass all users and their workstations, as well their access to the internet and company server databases and any information in between. The User Domain will enforce an acceptable use policy (AUP) to define what each…

    • 471 Words
    • 2 Pages
    Good Essays