Free Essay

Situation: Operation Richman’s Company

In: Computers and Technology

Submitted By TCoriell
Words 380
Pages 2
Dial-In Access Policy

1.0 Purpose
The purpose of this policy is to protect The Company’s electronic information from being inadvertently compromised by authorized personnel using a dial-in connection.

2.0 Scope
The scope of this policy is to define appropriate dial-in access and its use by authorized personnel.

3.0 Policy
The Company employees and authorized third parties (customers, vendors, etc.) can use dial-in connections to gain access to the corporate network. Dial-in access should be strictly controlled, using one-time password authentication.

It is the responsibility of employees with dial-in access privileges to ensure a dial-in connection to The Company is not used by non-employees to gain access to company information system resources. An employee who is granted dial-in access privileges must remain constantly aware that dial-in connections between their location and The Company are literal extensions of The Company's corporate network, and that they provide a potential path to the company's most sensitive information. The employee and/or authorized third party individual must take every reasonable measure to protect The Company's assets.

Analog and non-GSM digital cellular phones cannot be used to connect to The Company's corporate network, as their signals can be readily scanned and/or hijacked by unauthorized individuals. Only GSM standard digital cellular phones are considered secure enough for connection to The Company's network. For additional information on wireless access to the The Company network, consult the Wireless Communications Policy.

Note: Dial-in accounts are considered 'as needed' accounts. Account activity is monitored, and if a dial-in account is not used for a period of six months the account will expire and no longer function. If dial-in access is subsequently required, the individual must request a new account as described above.

4.0 Enforcement
Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.

5.0 Revision History

1. Dial in Access The policies it self 2. It is what everyone has to go by like the will be no USB ports open on company computers 3. Guideline is the standard that everyone has to follow 4. Ethics, blue tooth device security, information sensitive, risk assessment, Technology disposal. 5. Termination

Similar Documents

Premium Essay

Operation Richman’s Company It Network

...Richman Company’s, Final Project “Corey Networks” Situation: Operation Richman’s Company You are a networking security intern at Richman. You have asked to submit a proposal to Richman senior management. In the proposal, you must choose to address seven of the following and relate it to the appropriate SSCP domains: Issue one. Based on the premise that Richman has 5,000 employees throughout the main office and several branch offices, you must research solutions and detail the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. Issue two. Based on the premise that most of the managers have BlackBerry devices for instant communications and all employees are provided cell phones, you must research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity, and non-repudiation, and the recovery of encrypted information in its original form. Issue three. Based on the premise that there is a mix of computer running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code. Issue...

Words: 2271 - Pages: 10

Free Essay

Influencial Factor of Accounting

...CHAPTER 2 ENRIRONMENTAL INFLUENCE ON ACCOUNTING DEVELOPMENT 1 2.1 Introduction In international accounting research, environmental influence is the key to understanding one country’s accounting system. "To a large extent, accounting is a product of its environment. That is, it is shaped by, reflects, and reinforces particular characteristics unique to its national environment" (Radebaugh and Gray 1997). From the late 1960s, researchers in international accounting have tried to categorize countries according to a series of criteria, which have been developed on a deductive or conductive basis. These criteria tried to explain the reasons for accounting differences between countries; they aimed to describe and compare different systems with each other in an efficient way. There are several advantages to categorize and analyze the differences among countries: First, it promotes improved understanding of the complex realities of accounting practices, as well as the factors that shape a country’s accounting regulations; Second, it provides useful information for solving some of the important accounting problems that exist in the world. For example, it can help policymakers assess the prospects and problems of international harmonization; Third, it can assist in the training of accountants and auditors who operate internationally; And finally, it can enable a developing country to better understand the available and appropriate types of financial...

Words: 17162 - Pages: 69

Free Essay

Wipro

...October 2011: 1 | | Cabinet approves Bill to share mining profits | * Mines and Mineral Development and Regulation (MMDR) Bill, 2011 * Provides for mining companies to keep aside 26% of their net profits for a Mineral Development Fund to be used for development and rehabilitation of project-affected people in the tribal areas of the country * For the non-coal companies, amount will be equivalent to the royalty they pay * Appointed a regulatory body for overseeing the functioning of the mining sector and measures to tackle illegal mining | Maoist problem in West Bengal | * In Jangalmahal region of West Bengal * Maoists: Operations by security forces and peace talks cannot go together. | Yasin Malik's arrest sparks protests | * After police detained JKLF chairman Mohammad Yasin Malik for taking out a rally against the death sentence awarded to Afzal Guru | Court allows export of unused endosulfan | * SC has allowed the export of unused stock of endosulfan. * But the ban on use and production of the pesticide will continue | FDI in beekeeping | * GOI allowed 100 per cent FDI in beekeeping, also known as ‘apiculture' under automatic route * Other areas in which the permission has already been given: * Plantation * Horticulture * Seeds * Cultivation of vegetables and mushrooms * Animal husbandry * Pisciculture * Aquaculture | 2 | | Neelima's application for visa rejected | * American Consulate in Mumbai rejected Magsaysay...

Words: 37383 - Pages: 150