Preview

Unit 4 Assignment 2

Satisfactory Essays
Open Document
Open Document
1005 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 4 Assignment 2
NT2580: Introduction to Information Security
Unit 4 Assignment 2
4/12/2014
Acceptable Use Policy (AUP) Definition
Richman Investments Acceptable Use Policy
The use of company-owned computing devices and networks is a privilege, instead of a right, and inappropriate use can result in revocation of such privilege. Employees must remember that their behaviors represent the actions of the company, and the respect to the rights of others and all relevant laws, regulations and contracts. Employees also must be aware of that their inappropriate uses may lead to catastrophic results on the company and other employees. This acceptable use policy grants the right for users to gain access to the network of Richman Investments and also binds the said user to follow and abide accordingly to the agreements set forth for network access provided below.
Acceptable Uses:
General and authorized uses for achieving the objectives of their job description, and occasional personal communications by using email.
Unacceptable Uses:
For Internet Use, the following actions are prohibited:
Accessing, downloading, storing, recording sites that are offensive, obscene, defamatory, abusive or otherwise unlawful
Knowingly downloading any materials irrelevant to their work
Conducting actions irrelevant to their work, such as playing games, listening to music, watch videos, and etc.
Internet usage should be conducted for the company business only.
Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information.
The use of personal internet must be limited and only to be used for web based emails only with the approval of your Supervisor or Manager.
For Email Use, the following actions are prohibited:
Accessing inappropriate sites or inappropriate e-mail
Transmitting private mass mailings
Transmitting messages disclosing personal information without

You May Also Find These Documents Helpful

  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware, which spread to the network server. The security officer at Richman has asked you to research and to define “the acceptable use of Richman assets regarding Internet and e-mail access,” including the actions that are prohibited. The employees must be restricted from using the Internet at work for personal use, other than to occasionally check Web-based personal e-mail accounts. Personal downloads must be strictly prohibited. Your definition will become part of the overall Richman security policy.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Assignment 4

    • 122 Words
    • 1 Page

    A private network schema is a viable choice for internal IP addressing. Each office can have its own range to avoid conflicts with other locations if subnetted correctly. Assuming that all nodes and servers have only one interface, you should only need one public address per outward interface. In the diagram provided, you would only need one public IP address for the router connection to the Internet. Everything else can be addressed privately with the correct subnetting.…

    • 122 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 349 Words
    • 1 Page

    IP route: One entry in an IP routing table that lists some potential destination (usually a network ID or subnet ID) as forwarding instructions, including the interface out which the router should forward the IP packet.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Unit 8 Assignment 2

    • 1088 Words
    • 3 Pages

    Centralization sums up my primary reason for implementing Active Directory. The Active Directory structure makes it possible for you to achieve truly centralized management of users, regardless of how big your client’s network has become. If you've worked with Windows NT before, you know that in Windows NT a domain is a completely independent entity. While it's possible to create a trust relationship between domains that exist on a common network, the domains are never truly integrated with each other because there is no higher authority that manages the domains.…

    • 1088 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 457 Words
    • 2 Pages

    Global Limited has the reputation as one of the world’s leading providers of infrastructure information systems, software, and services around the world. Global’s clients range from world-wide enterprises to startup companies across all industry sectors, including financial services, manufacturing, transportation, and public services.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 558 Words
    • 2 Pages

    Language discrimination has been prevalent in society for thousands of years. This has been something that happens in every civilization and will not stop now. Language discrimination is unfair treatment of an individual by the way that they compose themselves in a verbal matter. What I mean by this is to treat someone unjust because of factors such as accents, vocabulary size, or just that they speak a different language. This happens a lot to tourists who don’t know how to speak proper English in the United States. I have lived in the United States my whole life and I have witnessed multiple accounts of this.…

    • 558 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    When accessing the company’s network (on-site or remotely), employees must limit personal computer and internet usage only during their allocated break and lunch times. During these times, internet and computer usage must be appropriate. In the case there is reasonable suspicion that an employee is in violation of this policy, the company holds the right to monitor computer activity. The company holds the right to terminate an employee based on information found after monitoring their workstation. If the offense does not deem a termination, computer training will be conducted for the employee to reestablish comprehension of proper use of company resources.…

    • 945 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The LAN to WAN acceptable use Policy will go hand in hand with the roles and tasks parts of the user domain. Users would be given access to certain systems, applications, and data depending on their access rights. The AUP is like a rulebook that employees need to follow when using an organization’s IT assets and if they are violated it could be grounds for termination. The AUP will set grounds on employees to understand that they are responsible for any and all actions on an organization’s IT assets. In particular to organizations…

    • 411 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Acceptable Use Policy

    • 622 Words
    • 3 Pages

    Thanks for all of your hard work and dedication to the company. We at MGI appreciate the level of gratitude that all of you put forth to make this company a driving force. Our major concern is that all employees in our company understand and comply with company policy. This Acceptable Use Policy (AUP) sets forth the Company’s policy with regard to the use of Autosource Group, Inc. (AGI) Computer and Network Resources. You, the user, are ultimately responsible for your actions in accessing and using Network Resources. As a user of AGI Network Resources, you are expected to review and understand the guidelines and procedures in this document.…

    • 622 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Purpose of Emails: The purpose of the email system is solely to conduct company business. All personal emails should be sent and received through your own private email address. Only authorized personnel may use the company email system.…

    • 1148 Words
    • 5 Pages
    Good Essays
  • Good Essays

    IKEA

    • 262 Words
    • 2 Pages

    d. Employees shall only access e-mail accounts through systems set up by the County, including…

    • 262 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Eng, Paul. "E-mail Ettiquete for Employees and Execs." ABC News. March 8, 2005. http://abcnews.go.com/Technology/Business/story?id=561845&page=1#.T1Tr70pVnN0 (accessed March 21, 2012).…

    • 1575 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    On the other hand, it can be argued that there are some drawbacks of using electronic mail. The most important downside is that the security system of e-mail is unreliable and unsafe. As a leakage of information or data can occur, it is advisable not to write private information in e-mail. Another worrying trend is that volumes of e-mails increase overload and stress. The e-mail sender expects a fast response and this further increases pressure. Moreover, too much use of e-mail allows viruses into the IT system. Additionally, people spend too much time on checking and using e-mails. This will be time and energy consuming.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Acceptable Use

    • 1456 Words
    • 9 Pages

    The University Information Technology Network includes: Internet/Intranet/Extranetrelated systems, including but not limited to computer/Networking equipment, Software,…

    • 1456 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Cis Computer Case Study

    • 1800 Words
    • 8 Pages

    First, the employees are always available and easy to reach. In fact, sometimes it is essential that the employee checks the important information in a particular moment that is why, easy access to the work e-mail is convenient. Second, the employees are able to access important information by using their portable devices (iPhones, BlackBerries etc). It is important to mention that those applications provide the same high level of security for authenticating users. Third, business applications allow big…

    • 1800 Words
    • 8 Pages
    Good Essays

Related Topics