Tuesday, April 16, 2019

Richman Investments Essay Example for Free

Richman Investments EssayOverviewTo stop malwargon problems from occurring at Richman Investments Protecting Richman investments employees, partners and company from illegal or damaging effects by individuals either knowingly or unknowingly Internet /intranet/ extranet related systems including but non limited to computer equipment, softw be, operating systems, storage media, interlocking accounts providing electronic mail, www browsing, and FTP, ar the property of Richman investments. These systems argon to be apply for business purposes in serving the interests of the company and of our clients and customers in the course of normal operationsPurposeThe purpose of this form _or_ system of government is to mitigate the improper use of company computer asset these rules are in place to foster the employee and Richman investments. Inappropriate use exposes Richman investments to risks including virus attacks, compromise of network systems and services, and legal issues. bac kclothI would like to implement a new AUP policy to stop these problems from occurring they need to design an AUP to allow user know what they skunk or cant do on the system. And use the IT division to restrict access to removable devices.Policy1.While Richman investments network administration desires to provide a reasonable take of privacy, users should be aware that the data they create on the corporate systems remains the property of Richman investments. Because of the need to protect Richman investments network, management cannot guarantee the confidentiality of information stored on any network device belonging to Richman investments. 2.Employees are prudent for creating guidelines concerning personal use of Internet/Intranet/Extranet systems. In the absence of such policies, employees should be guided by departmental policies on personal use and if there is any uncertainty, employees should consult their supervisor or manager. 3.For security and network maintenance purpo ses, authorized individuals within Richman investments whitethorn monitor equipment systems and network traffic at any time. 4.Richman investments arrest the right to audit networks and systems on aperiodic basis to ensure compliance with this policy.Security and patented Information1.The user interface for information contained on internet/intranet/Extranet related systems should be classified as either confidential or not confidential, as defined by corporate confidentiality guidelines details of which can be found in the HR policies. Examples of confidential information include but are not limited to company private, corporate strategies, competitor sensitive, trade secrets specifications, customer lists, and research data. Employees should take all indispensable steps to prevent unauthorized access to this information. 2.Keep passwords secure and do not share accounts. Authorized users are responsible for the security of their passwords and accounts. System level passwords s hould be changed quarterly user level passwords should be changed every six months. 3.All PCs, laptops and workstations should be secured with a password protected screensaver with the automatic activation feature set at 10 minutes or less or by logging off when the host get out be unattended.4.Use encryption of information in compliance with acceptable encryption n use policy 5.Postings by employees from a Richman investments netmail address to new groups should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of Richman investments unless posting is in the course of business duties. 6.All host used by the employee that are connected to the Richman investments , Internet/Intranet/Extranet, whether owned by the employee or Richman investments shall be continually kill approved virus scanning software with a current virus database unless overridden by departmental or group policy. 7.Employees must use extreme caution when op ening email attachments received from unknown senders which may contain viruses, email bombs, or Trojan horse code.Unacceptable useThe following activities are in general prohibited. Employees may be exempted from these restrictions during the course of their legitimate job responsibilities system administration staff may have a need to disable the network access of a host if that host is disrupting doing services. Under no circumstances is an employee of Richman investments authorized toengage in any activity that is illegal low local, state, federal or international law while utilizing Richman investments owned resources.Email and communications activities1.Sending unsolicited email messages including the sending of junk mail or other advertising material to individuals who did not specifically demand such material email spam. 2.Any form of harassment via email, telephone or paging whether through language, frequency or size messages. 3.Unauthorized use or forging of email hea der information.4.Solicitation of email for any other email address other than that of the posters account with the intent to harass or stash replies. EnforcementAny employee found to have violated this policy may be subject to disciplinary action up to and including termination of employment

No comments:

Post a Comment