Global Distribution Inc.'s Security Policy Regarding Computer Usage

1741 words - 7 pages

Acceptable Use Policy
Purpose --The purpose of this policy is to detail acceptable computer usage at Global Distribution Inc. Adhering to acceptable usage standards protects the user and the company from potential attack.
Scope -- This policy applies to all personnel associated with Global Distribution Inc., whether permanent personnel, temporary, or contractor. This policy applies to all equipment owned and operated by Global Distribution Inc.
Policy -- Acceptable Use -- All users requesting access to Global Distribution Inc workstations and network resources will be required to sign an acknowledgement of acceptable use policies. All users should exercise good judgment while using business network resources for personal use. All users will adhere to password policy. All workstations will lock with password requirement upon ten minutes of idling. All users are responsible for the secrecy of their password. Do not write down or share a password with anyone.
Unacceptable Use -- Users should not engage in any illegal activities while using Global Distribution Inc workstations or network resources. Users should not allow others to utilize their account. Port scanning is expressly prohibited. The sending of unsolicited email is prohibited. Harassment via email or over Global Distribution Inc. equipment is prohibited. Authorized users should not express personal opinion via blogs with Global Distribution Inc name attached. Any employee found to be in violation of any of these policies is subject to disciplinary action and/or termination of employment.
Physical Access Security Policy.
Purpose – This policy is intended to detail procedures for granting access, control of access, and revocation of access to approved users of Global Distribution Inc. network devices.
Scope – This policy applies to all employees and authorized users associated with Global Distribution Inc., to include administrators.
Policy – All physical security systems will be inspected annually and must adhere to building and fire code policies. Employee requests for access to Global Distribution Inc facilities must be approved for physical access to be granted. Upon approval of access, the requester will receive a key card which he/she will use for access to facilities. This key will not be shared with any other person. Visitors must sign in at the receptionist and receive a visitor ID tag. Visitors are required to sign Global Distribution Inc. entry log and are required to wear the visitor ID tag which they are issued. Failure to adhere to this policy can result in disciplinary action and/or termination. Visitors found on the premises without proper identification will be escorted to the receptionist for check-in and ID issue.
Securing Sensitive Information Policy
Purpose – The purpose of this policy is to detail information classification and security levels within Global Distribution Inc. and the measures of security take for each level to ensure the...

Find Another Essay On Global Distribution Inc.'s Security Policy Regarding Computer Usage

Effect of computers on human society

756 words - 4 pages The early computer development began in the late 60’s, at that time their common use was for complex mathematical calculations, and were mostly used by government corporations. As time went on computers became widely popular, and they were being used at a personal level. The Apple Lisa Computer was the first successful personal computer with a GUI interface which was introduced in 1983. Nowadays computers have become extremely popular, and they

Asset Identification and Classification Policy Essay

3063 words - 13 pages Asset Identification & Classification Policy Policy Definition It is the goal of this organization to implement the policies necessary to achieve the appropriate level of protection for each corporate asset. Standard Protecting each asset requires collaboration from every employee. Different assets have a different probability of failure do to vulnerabilities, threats and require annual information security training for each employee

How Effective is Trademark Law in the Context of Online Disputes?

2409 words - 10 pages . Registered or common law trademarks are not automatically entitled to ownership of domain names as the registration acceptance criterion is based on the grounds of a “first-come, first-served” policy which poses an issue pertaining to the global impact of domain names versus the jurisdictional nature of trademark rights. Online commerce poses the question of which party should obtain a domain name where more than one authority has a claim to a trademark

Impact globlalization Apple

4036 words - 16 pages Untitled Globalization and its Impact on Apple Inc. Introduction Today the world has become a global village where each and every thing is interlinked. The concept of global village or global merger is based on the grounds of globalization. Now the question arises in one's mind what is globalization? Much has been written by the academic writers, analysts and economists on the concept of

The Computer Industry

1922 words - 8 pages , software, and networking of the infrastructures. The computer industry has existed through much of history. Electronic computers were developed during the time period of 1940-1945. There are many products that have developed from the computer industry such as video games, cell phones, airplanes and more. Computer Industry – An article on the revolution of the computer industry. Comp TIA Advancing the Global IT Industry – A nonprofit organization

Employee Privacy

1284 words - 5 pages . Employees will have to agree to exercise good judgement regarding personal usage. Employees must be careful not toviolate the company's policy or violate the law. Employees would be responsible for maintaining the security of their account and their passwords. Employees password should be changed every 60 days and they should log off when the terminal is not in use. Any voicemail messages will be deleted after five days. If the company finds

mobile communication and mobile application development

1745 words - 7 pages paradigm based on portable devices connecting wirelessly to the emerging “mobile Internet” (Raychaudhuri and Mandayam , 2012), Figure 1: Global Mobile Data Traffic shows the increasing demand for mobile data over voice. Cellular technologies started moving to data and Internet with the introduction of Third Generation (3G) back in 2000’s.   2. Mobile Technological Improvement Evolution of mobile technology is such that, every ten years a new

Computer Viruses

4482 words - 18 pages its integrity intact.BibliographyComputer security: Hackers penetrate DoD computer systems. Testimony before the Subcommittee on Government Information and Regulation, Committee on Government Affairs, United States Senate, Washington DC, November 1991.Peter Denning. Computers Under Attack: Intruders, Worms, and Viruses. ACM Press, 1990.Simon Garfinkel and Eugene Spafford. Practical UNIX Security. O'Reilly & Associates, Inc., 1991.Katie

Info-Sys Management with E-commerce applications

3812 words - 15 pages multimedia content and network used various IT programming language such as HTML, Java and VRML. Technology Choice is one of the E-commerce application examples. It is computer online retailer which uses the HTML, Java, and JavaScript as a medium to create their own website. Consequently, IT could create a technology centre, increasing control, maintaining the security among the business operation. Moreover, the widespread of business operation

Uses and Abuses of Biochip Technology

1680 words - 7 pages the fall, 2004 Biometrics Summit. The area of discussion at the conference questioned the threat of identity fraud, and the requisites to prevent further deception. The concept of security and identity, appear to be affecting all corners of society today. All who attended the conference are advocates of Biometric technologies. In particular, this publication did not reflect detailed information regarding the future of the Biometric industry

Common security arguments

2967 words - 12 pages , remotely. Reid explained his reason to target, Microsoft Windows' a negligent security model yet profiting from end-users' weakness to buy their first computer for Internet access, unaware the O/S security flaws and potential Internet danger. (, 2002) Maybe they are today's Robin Hoods or maybe not.1984's "Great Hacker War". Masters of Deception (MOD) led by Phiber Optik, ex-LOD opposed Legion of Doom (LOD) group founder, Lex Luther. Since

Similar Essays

Library User´S Perspective Regarding Library Usage

2520 words - 11 pages 2 Category “sharing” and its associated concepts. Category Properties Dimensional range Sharing Ownership Benefit Individual ---------- Collective Personal ---------- Social Sharing varied from “individual” to “collective” along the property of “ownership”. For instance, a staff member of the library drafts an interlibrary loan policy and posts it on the library’s blog. The draft is then commented on by other librarians and library users

Soboat Technology Inc.: Information Sercurity Plan

2272 words - 10 pages Security Policy. (2010). SoKap Community Networks, Inc. Retrieved from Giannoulis, P. & Northcutt, S. (2007). Physical Security. SANS Technology Institute. Retrieved from Information Security Policies Physical and Environmental Security Policy. (2011). Retrieved from Infosec Acceptable Use

Auditing The It Security Function: An Effective Framework

3483 words - 14 pages strictly follow the global security standards, such as ISO 17799.Objective of the AuditThe overall objective of the audit is to ensure the compliance of all sensitive information and Government Security Policy (GSP) and the operational standards and the effectiveness and efficiency of the security program at each organisation. This broad objective is examined by focusing on the effectiveness of the management structure of the Physical Security

Riordan Manufacturing Service Request Essay

3662 words - 15 pages essay will make use of the systems development life cycle to explain how an IT consulting firm works with an organization to realize its business and IT goals.Company BackgroundRiordan Manufacturing, Inc. is a global plastics manufacturer. Riordan's products include plastic beverage containers produced at its plant in Albany, Georgia, custom plastic parts produced at its plant in Pontiac, Michigan, and plastic fan parts produced at its facilities