Unit 4 Assignment 2: Acceptable Use Policy (Aup) Definition

In: Computers and Technology

Submitted By kovbasa1234
Words 358
Pages 2
Impact of a Data Classification Standard | Unit 1 Assignment |

Domain
This Domain is where only one user will have entrance to it. This can be configured to internal usage only. By default, the IT department tries to sustain a certain level of Security for this, so that nobody can enter from the outside, only the IT Department may grant access privilege for Remote Access. The User Domain will enforce an acceptable use policy (AUP) to define which user can and cannot do with any company data that he or she has access to. Also, every user on the company is responsible for the safekeeping of the environment.

2. LAN Domain The Local Area Network Domain is a group of computers that are all connected to a single LAN domain. The LAN Domain is a collection of computers connected to each another or to a common medium. All LAN domains have data closets, physical elements of the LAN, and logical elements as designated by authorized personnel. It involves strong security and access controls. This domain can access company-wide systems, applications, and data from anyplace within the LAN. The LAN support group is in control of maintaining and securing the domain. The biggest threat to the LAN domain is an Un-authorized access to anything on the network. For example: LAN, the systems, and data. One thing we can do is require strict security protocols for this domain, such as disabling all external access ports for the workstation. This would cause a no access protocol.

3. Workstation Domain Workstation Domain is where all the users work. Before a user can log into the machine, he or she will need to be confirmed in order to gain admission. At Richman Investments, we will provide a secure access point for every employee workstations with username and password permission as well as a security protocol requires the password to be…...

Similar Documents

Define an Acceptable Usage Policy(Aup)

...Unit 5 Assignment 2: Define an Acceptable Use Policy(AUP) LAN-WAN is where the IT Infrastructure links to a wide area network and internet. * Monitoring software and controls for possible intrusion * Apply a email server antivirus (also applies for attachments). * Disable port scanning and pinging for exterior devices. * Denial of outbound traffic using source IP addresses. * File transfer monitoring Web Surfing and the Usage of the internet * Apply a domain-name content filter at internet access points * Employees will possibly lose productivity while searching the web for non-work related material(Facebook, YouTube, etc). The possible cons of putting a limitation on web surfing is that employees may lack the tools necessary to find information. Certain filters would be applied to where everyone will not be able to use certain sites that may prove useful to them. For example if they receive a call from a customer regarding something they have no access to looking up. They will not be able to provide an answer to satisfy the consumer. One the other hand, it could prevent a loss of productivities from employees using social media sites such as Facebook, and Myspace. It could also help to prevent possible virus and malware infections. Usage of email are covered in the email usage policy Richman Inv. Employees: * No peer-to-peer file sharing or externally reachable file transfer protocol servers * No downloading executables from known......

Words: 337 - Pages: 2

4.3 Acceptable Use Policy Definition

...4.3 Acceptable Use Policy Definition Richman Investments Internet Policy Policy: Access to the Internet through the Richman Inverstments is a privilege. Users granted this privilege must adhere to strict guidelines concerning the appropriate use of this information resource. Users who violate the provisions outlined in this document are subject to disciplinary action up to and including termination. In addition, any inappropriate use that involves a criminal offense will result in legal action. All users are required to acknowledge receipt and understanding of guidelines contained in this document. Purpose: To define policies and procedures for access to the Internet through the Richman Inverstments network infrastructure. Scope: This policy applies to all personnel with access to Internet and related services through the Richman Inverstments network infrastructure. Internet Related services include all services provided with the TCP/IP protocol, including but not limited to Electronic Mail (e-mail), File Transfer Protocol (FTP), Gopher, and World Wide Web (WWW) access. Procedure: 1.0 ACCEPTABLE USE 2.1. Access to the Internet is specifically limited to activities in direct support of official Richman Inverstments business. 2.2. In addition to access in support of specific work related duties, the Richman Inverstments Internet connection may be used for educational and research purposes. 2.3. If any user has a question of what constitutes......

Words: 669 - Pages: 3

Acceptable Use Policy

...Acceptable Use Policy System and Network Activities The following activities are strictly prohibited, with no exceptions: Email and Communications Activities 1. Sending unsolicited mail messages, including, without limitation, commercial advertising and informational announcements, is explicitly prohibited. A user shall not use another site's mail server to relay mail without the express permission of the site. 2. Any form of harassment via email, telephone or paging, whether through language, frequency, or size of messages. 3. Unauthorized use, or forging, of email header information. 4. Solicitation of email for any other email address, other than that of the poster's account, with the intent to harass or to collect replies. 5. Creating or forwarding "chain letters", "Ponzi" or other "pyramid" schemes of any type. 6. Use of unsolicited email originating from within networks of other Internet/Intranet/Extranet service providers on behalf of, or to advertise any service. 7. Posting the same or similar non-business-related messages to large numbers of Usenet newsgroups (newsgroup spam). 8. Violate any applicable law or regulation; or Encourage or enable any other individual to do any of the activities prohibited in this Acceptable Use Policy. 9. Blogging by employees, whether using Richman Investments property and systems or personal computer systems, is also subject to the terms and restrictions set forth in this Policy. 10. Richman Investments......

Words: 354 - Pages: 2

Acceptable Use Policy Definition

...Acceptable Use Policy (AUP) Definition After research and careful consideration of some of the other policies listed by other companies such as AT&T, Sprint, T-Mobile, and Verizon Wireless, Richman Investments has come up with the an acceptable use policy (AUP). The following are not allowed at any time: Making of unauthorized promises in e-mail. All emails should have a footer which states that the messages are from the sender only and do not represent the decisions or policies of Richman Investments. Using company resources or web services to visit web sites which contain inappropriate material is prohibited. This includes pornography, sexually oriented material, or sites which promote or depict discrimination, violence, or illegal activities. In addition, it is no longer allowed to have big attachments to multiple recipients in the organization will be enforced. This can tie up the system during a busy point in the day which could end up keeping the company from making profitable decisions. In addition, no jokes or humorous items on Richman Investments email system. These emails may not be considered funny to some, therefore will not be allowed by any. Making statements concerning race, sexual orientation, disability, religion, or national origin are prohibited. These statements could be seen as harassment by either the person receiving it or by other people that may see it. Use of company email to support inappropriate activities is not allowed. Checking a......

Words: 324 - Pages: 2

Acceptable Use Policy

...Acceptable Use Policy (AUP) The three companies I compared policies with were; SANS, Sopho, and Pinterest. In regards to SANS institute and Sopho they were alike in several ways first of all the AUP was from a employee / company comparison, such as not sharing id's, passwords, company's copyright information etc…They also shared Pirated software not licensed by the company is prohibited. My third choice Pinterest is more of a social site and some of the policies are different because even though your accessing the companies site to post images, opinions etc…they still have AUP in place to restrict users from posting pornographic images, creates a risk of harm, loss, physical or mental injury, emotional distress, death, disability, disfigurement, or physical or mental illness to yourself, to any other person, or to any animal. Researching different companies policies gave me a broader understanding on how to tailor the AUP to better suit the company, in other words they are not all the same. You need to create on a case by case bases. My AUP definition for Richman Investments Acceptable Use and Unacceptable use are as follows; The following activities are, in general, prohibited. Employees may be exempted from these restrictions during the course of their legitimate job responsibilities (e.g., systems administration staff may have a need to disable the network access of a host if that host is disrupting production services). Richman......

Words: 619 - Pages: 3

Acceptable Use Policy

...Investments ACCEPTABLE USE POLICY Information Security Policy Number 12345 Effective 10/15/2013` I. Introduction An Acceptable Use Policy (AUP) is an organization-wide policy that defines what is allowed and what is not allowed regarding use of Information Technology (IT) assets by employees. The following policy is to be followed by all employees of Richman Investments, authorized individuals, vendors, and contractors who use any information technology (IT), electronic, or communication devices owned and/or provided by Richman Investments for the purpose of assisting them with their job-related duties. Access to the Internet is a privilege and all employees must adhere to the policies regarding computer, email, and Internet usage. Violation of these policies will result in disciplinary and/or legal action that may include counseling, revocation of company devices, termination of the employee, and legal action. II. Roles and Responsibilities Every employee must acknowledge that they have received a copy of the AUP and confirm that they have a complete understanding and agree to abide by the rules set forth in the AUP. Receipt and signing of the AUP will occur at Employee Orientation, and in the event of changes to the policy, a revised AUP must be signed. III. Policy Directives A. Acceptable Use Management Requirements A Standard Operating Procedure (SOP) will be established to support the development and maintenance of this AUP. Richman......

Words: 747 - Pages: 3

Unit 5 Assignment 2 Define an Acceptable Use Policy (Aup)

...Unit 5 Assignment 2: Define an Acceptable Use Policy (AUP) Acceptable Use Policy Richman Investments holds requirements for the usage of the company network including filtering policies for network traffic. LAN – WAN is where the IT infrastructure links to a wide area network and internet. For Security (Administrators and Managers) - Security monitoring controls for intrusion - Apply email server and attachment antivirus and email quadrating for unknown file types - Disablement for ping, probing, and port scanning on all exterior IP devices - Denying of outbound traffic using source IP addresses - Apply file transfer monitoring, scanning and alarming for unknown file types Web Surfing is the usage of the internet browsing a series of web browsers For Security (Administrators and Managers) - Apply domain-name content filtering at the internet entry/access point - Employees may lose productivity while searching web for no work related material Cons putting a limitation to web surfing may cause the employee to lack independence of finding information. What if they need to look up an answer to a customers’ question and has to find it on the web? Pros not using the internet could prevent a wide variety of viruses and the company is only allowed to use their company accounts to send out emails to customers. Guidelines to usage of email are covered under email usage policy Richman Investment Employees: Certain traffic is expressly forbidden: - No peer-to-peer......

Words: 339 - Pages: 2

Acceptable Use Policy

...Samantha Landi 10-11-13 Unit 4 Assignment 2 This acceptable use policy grants the right for users to gain access to the network of Richman Investments and also binds the said user to follow and abide accordingly to the agreements set forth for network access provided below. Policy guidelines       The use of peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers is strictly forbidden. Downloading executable programs or software from any websites, even known sites, will not be tolerated. The user will not redistribute licensed or copyrighted material without first receiving authorization. Do not export internal software or technical material in violation of export control laws. Introduction of malicious programs into networks or onto systems will not be tolerated. Do not attempt to gain access to unauthorized company resources or information from external or internal sources. Port scanning or data interception on the network is forbidden and legitimate users shall not have a denial of service or circumventing of authentication.       Use of programs, scripts, or commands to interfere with other network users is strictly prohibited. Sending unsolicited e-mail messages or junk mail to company recipients is prohibited. There will be no accessing of adult content from company resources. Remote connections from systems failing to meet minimum security requirements will not be allowed. Access to social media websites such as, Google,......

Words: 257 - Pages: 2

Unit 4 Assignment 2

...Unit 4 Assignment 2: Acceptable Use Policy Definition NT2580 The following acceptable use policy has been designed for Richman Investments and grants the right for users to gain access to the network of Richman Investments and also requires the user to follow the terms of use set forth for network access. Policy Guidelines * The use of peer to peer file sharing is strictly prohibited. This includes FTP. * Downloading executable programs or software from any websites, known or unknown, is forbidden. * Users are not allowed to redistribute licensed or copyrighted material without receiving consent from the company. * Introduction of malicious programs into networks or onto systems will not be tolerated. * Attempts to gain access to unauthorized company resources or information from internal or external sources will not be tolerated. * Port scanning and data interception on the network is strictly forbidden. * Authorized users shall not have a denial of service or authentication. * Using programs, scripts, commands, or anything else that could interfere with other network users is prohibited. * Sending junk mail to company recipients is prohibited. * Accessing adult content from company resources is forbidden. * Remote connections from systems failing to meet minimum security requirements will not be allowed. * Social media will not be accessible on company resources. *......

Words: 263 - Pages: 2

Define an Acceptable Use Policy

...1.0 Introduction Richman Investments at all times is to establish acceptable and unacceptable use of electronic devices and network resources. All employees of Richman Investments must comply with the rules and regulations for use of the Internet, sending e-mail, entering to social media sites, and downloading attachments from internet. The Richman Investments AUP will help achieve these goals. 2.0 Scope Every supervisor, employee and temporary employee that works for Richman Investments must follow this policy as it is written. This policy also applies to all equipment affiliated with Richman Investments. 3.0 Policy 3.1 General As an employee of Richman Investments, you are responsible for the internet access. In ordnance with the policies set forth by Richman Investments resources may not be used for any unlawful or prohibited purpose. For extra security Richman Investments will monitor all systems, equipment, and network using the Audit Policy. Any devices that might interfere with the Richman Investments network will be immediately disconnected. Firewalls must be turn on at all times. Antivirus programs must be updated regularly. 3.2 Security 1. Every device connected to the Richman Investments network must comply with the Access Control Policy. All hard drives must be encrypted. 2. All employees of Richman Investments must keep their passwords secure and do not share accounts. Authorized users are responsible for the security of their...

Words: 620 - Pages: 3

Nt2580 Unit 4 Acceptable Use Policy Definition

...Unit 4 Assignment 1: Enhance and Existing IT Security Policy Framework Program Framework Policy 1.0 Purpose The purpose of this policy is to define standards for connecting to Richman Investment's network from any host. These standards are designed to minimize the potential exposure to Richman Investment from damages which may result from unauthorized use of Richman Investment resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman Investment internal systems, etc. 2.0 Scope This policy applies to all Richman Investment employees, contractors, vendors and agents with any computer that is connected to Richman Investment’s Network. This policy applies to remote access connections used to do work on behalf of Richman Investment, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc. 3.0 Policy 3.1 General 1. It is the responsibility of Richman Investment employees, contractors, vendors and agents with remote access privileges to <Company Name>'s corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to Richman Investment. 2. General access to the Internet for recreational use by immediate household members through......

Words: 737 - Pages: 3

Nt2580 Unit 4 Assignment 2

...Dallas Page July 17, 2015 Unit 4 Assignment 2 NT2580 Acceptable Use Policy Definition 1. Overview To protect the integrity, confidentiality and accessibility along with the safety of our clientele and employees it is necessary that a precise set of standards must be defined for anyone who utilizes the electronic devices to access information via the internet. Richman Investments is committed to protecting employees, partners and the company from illegal or destructive actions whether knowingly or unknowingly. Internet or Intranet related systems, including but not limited to the World Wide Web, storage media, operating systems, network accounts and electronic mail are intended to be used for business pertaining to Richman Investments. It is the responsibility of each electronic device user to know the guidelines of the Acceptable Use Policy and to adhere to the Acceptable Use Policy of Richman Investments. 2. Purpose To outline and give a clear precise definition of what is and what isn’t acceptable when using the property of Richman Investments. Property including but not limited to computers, internet service, email service, storage media, operating systems or network accounts. Inappropriate use of either of the aforementioned exposes Richman Investments to legal liability and/or risks of damage to company hardware and/or software. 3. Scope The Acceptable Use Policy applies to all employees, contractors, clients, visitors and partners to...

Words: 689 - Pages: 3

Purpose of an Acceptable Use Policy

...Purpose of an Acceptable Use Policy Name Institution Course Date Purpose of an Acceptable Use Policy Acceptable use policy is an official and legal document that binds the employees of Tata communications to understand that the information and data is the property of the organisations and there are a certain rules that should be abided by when using this information. It secures the rights of a company to enforce certain obligations over them to make sure that they do not indulge in unethical and unprofessional sharing of the information upon which they are working or can access. The acceptable use policy which is taken as an example for the purpose of this paper is of Tata communications, which is the telecommunication company in India. The policy aims to elucidate the guidelines and standards for the employees to make sure that the information privacy and security is not compromised by the employees and that they are well aware of how to use the information. Every new employee at the company is made to go through the acceptable use policy and sign it for future reference. This maintains the check over the usage and sharing pattern of the employees. Each and every point that is central or peripheral to the usage and sharing is mentioned clearly with enough examples and instances to remove any kind of confusion to the employees. Critique the AUP The AUP is very well written and communicated however, there are certain points that can be......

Words: 953 - Pages: 4

Acceptable Use Policy

...Internet Acceptable Use Policy (AUP) After careful consideration and research of some of the other policies listed by other companies such as AT&T, Widgets Inc, and Amazon Web Services; Richman Investments has come up with the following acceptable use policy (AUP). The following are not allowed at any time: 1. Making of unauthorized promises in e-mail. All emails should have a footer which states that the messages are from the sender only and do not represent the decisions or policies of Richman Investments. 2. Using company resources or web services to visit web sites which contain inappropriate material. This includes pornography, sexually oriented material, or sites which promote or depict discrimination, violence, or illegal activities. 3. Sending big attachments to multiple recipients in the organization. This can tie up the system during a busy point in the day which could end up keeping the company from making profitable decisions. 4. Sending jokes or humorous items on Richman Investments email system. These emails may not be considered funny to some, therefore will not be allowed by any. 5. Making statements concerning race, sexual orientation, disability, religion, or national origin. These statements could be seen as harassment by either the person receiving it or by other people that may see it. 6. Use of company email to support inappropriate activities. Checking a doctor’s appointment is fine, running a side-business is not. 7.......

Words: 360 - Pages: 2

Itt-It225 Homework: Unit 4 Assignment 2: Acceptable Use Policy (Aup) Definition

...in relations to the business. However, Richman Investments has a policy for the use of the internet whereby employees must ensure that they: A) Comply with current legislation B) Use the internet in an acceptable way C) Do not create risks for the computer by misusing the internet. Unacceptable behavior The following has been deemed as unacceptable use of the internet by employees. A) Visiting internet sites that contain obscene, hateful, porographic or otherwise illegal meterial. B) Using the computer to perpetrate any form of fraud, or software, film, or music piracy. C)Using the internet to send offensive or harassing material to other users. D) Downloading commercial software or any copyrighted materials belonging to third parties, unless this download is coverted or permitted under a commercial agreement or other such license. E) Hacking into unauthorised areas. F) Publishing defamatory and/or knowingly false material about Richman Investments, your colleagues and/or our customers on social networking sites, ‘blogs’, ‘wikis’ and any other online publishing format. G) Revealing confidential information about Richman Investments, in a personal online posting, upload or transmission 0 including financial information and information relating to our customers, business plans, policies, staff and/pr internal discussions. H) Undertaking deliberate......

Words: 477 - Pages: 2