Help with worksheet 11 | Computer Science homework help

4. Policy

4.1 General Use and Ownership

4.1.1 <Company Name> proprietary information stored on electronic and computing devices whether owned or leased by <Company Name>, the employee or a third party, remains the sole property of <Company Name>. You must ensure through legal or technical means that proprietary information is protected in accordance with the Data Protection Standard. 4.1.2 You have a responsibility to promptly report the theft, loss, or unauthorized disclosure of <Company Name> proprietary information. 4.1.3 You may access, use or share <Company Name> proprietary information only to the extent it is authorized and necessary to fulfill your assigned job duties. 4.1.4 Employees are responsible for exercising good judgment regarding the reasonableness of personal use. Individual departments are responsible for creating guidelines concerning personal use of Internet/Intranet/Extranet systems. In the absence of such policies, employees should be guided by departmental policies on personal use, and if there is any uncertainty, employees should consult their supervisor or manager. 4.1.5 For security and network maintenance purposes, authorized individuals within <Company Name> may monitor equipment, systems, and network traffic at any time, per Infosec's Audit Policy. 4.1.6 <Company Name> reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy.

4.2 Security and Proprietary Information

4.2.1 All mobile and computing devices that connect to the internal network must comply with the Minimum Access Policy. 4.2.2 System level and user level passwords must comply with the Password Policy. Providing access to another individual, either deliberately or through failure to secure its access, is prohibited. CONSENSUS POLICY RESOURCE COMMUNITY © 2022 SANS™ Institute 4.2.3 All computing devices must be secured with a password-protected lock screen with the automatic activation feature set to 10 minutes or less. You must lock the screen or log off when the device is unattended. 4.2.4 Postings by employees from a <Company Name> email address to newsgroups or other online platforms, should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of <Company Name>, unless posting is during business duties. 4.2.5 Employees must use extreme caution when opening email attachments received from unknown senders, which may contain malware. 4.3 Unacceptable Use The following activities are, in general, prohibited. Employees may be exempted from these restrictions during their legitimate job responsibilities (e.g., systems administration staff may have a need to disable the network access of a host if that host is disrupting production services). Under no circumstances is an employee of <Company Name> authorized to engage in any activity that is illegal under local, state, federal or international law while utilizing <Company Name>-owned resources. The lists below are by no means exhaustive but attempt to provide a framework for activities which fall into the category of unacceptable use. 4.3.1 System and Network Activities The following activities are strictly prohibited, with no exceptions: 1. Violations of the rights of any person or company protected by copyright, trade secret, patent or other intellectual property, or similar laws or regulations, including, but not limited to, the installation or distribution of "pirated" or other software products that are not appropriately licensed for use by <Company Name>.

6,541views
4.6
(112 ratings)

Related Study Guides

Thesis | Political Science homework help

12. References ....……………………………………….………………………….…. 8 Abstract The increasing complexity of transnational crime necessitates strong international policing cooperation. While hard power mechanisms such as...

political-sciencelaw

Government module 7 | Government homework help

government module 7 deefer- a month ago - 20 governmentmodule7.docx governmentmodule7.docx I don’t have the text for this assignment, but you can find most of the information online. Part A 300 words...

political-scienceart-design

Week 6 | Criminal homework help

week 6 djinvasion16week 6 discussion/paper - 2 months ago - 27 week6.docx week6.docx 1 5 Week 6 510 discussion 1 (250 words) The issue of legalization of marijuana is gaining national attention with a...

political-scienceart-design

Week 6 replies | Criminal homework help

week 6 replies djinvasion16replies 100 words each - 2 months ago - 15 week6replies.docx week6replies.docx 2 **** In your responses, discuss relevant theories and schools of thought you believe may app...

political-sciencelaw

Viii | Information Systems homework help

3. Explain the current state of critical infrastructure protection (CIP) in the United States. 3.2 Outline steps that an organization could use to create a new cybersecurity program or improve an exis...

political-sciencelaw

Week 3 discussions 510 | Law homework help

week 3 discussions 510 djinvasion16Discussion - 3 months ago - 9 510week3discussions.docx 510week3discussions.docx 2 discussions 250 word minimum Discussion 1 In Chapter 6, the authors provide two sce...

art-designpolitical-science

Bi: week 5 assignment | Information Systems homework help

BI: Week 5 Assignment kgf_rocky_bhaiComplete the following assignment in one MS word document: Chapter 5 – Discussion Question #1 Go to the Teradata University Network Web site (teradatauniversitynetw...

computer-scienceart-design

Assignment 5 Cloud-Native Application Security for a Tech Startup | CSIS 343 - Cybersecurity

4. Additional Security Considerations 4.1. Third-Party Dependencies: Evaluate third-party dependencies used within your serverless functions. Ensure that libraries and modules are kept up to date to p...

art-designcomputer-science

Need Help With A Similar Question?

Our experts deliver perfect solutions with guaranteed A+ grades

A+
Student Grade
98%
Success Rate
12h
Delivery Time
Join 1,000+ students who got their perfect solutions
Rated 4.9/5 by satisfied students

Need Help With This Question?

Academic Expert

Subject Matter Specialist

98%
Success Rate
24/7
Support

Why Students Trust Us

  • PhD-Level Expertise
  • Original Work Guarantee
  • Better Grade or Free

"Got an A+ on my assignment. Exactly what I needed!"

Recent Student