Global Distribution Inc.'s Security Policy Regarding Computer Usage

1887 Words4 Pages

Acceptable Use Policy

Purpose --The purpose of this policy is to detail acceptable computer usage at Global Distribution Inc. Adhering to acceptable usage standards protects the user and the company from potential attack.

Scope -- This policy applies to all personnel associated with Global Distribution Inc., whether permanent personnel, temporary, or contractor. This policy applies to all equipment owned and operated by Global Distribution Inc.

Policy -- Acceptable Use -- All users requesting access to Global Distribution Inc workstations and network resources will be required to sign an acknowledgement of acceptable use policies. All users should exercise good judgment while using business network resources for personal use. All users will adhere to password policy. All workstations will lock with password requirement upon ten minutes of idling. All users are responsible for the secrecy of their password. Do not write down or share a password with anyone.

Unacceptable Use -- Users should not engage in any illegal activities while using Global Distribution Inc workstations or network resources. Users should not allow others to utilize their account. Port scanning is expressly prohibited. The sending of unsolicited email is prohibited. Harassment via email or over Global Distribution Inc. equipment is prohibited. Authorized users should not express personal opinion via blogs with Global Distribution Inc name attached. Any employee found to be in violation of any of these policies is subject to disciplinary action and/or termination of employment.

Physical Access Security Policy.

Purpose – This policy is intended to detail procedures for granting access, control of access, and revocation of access to approve...

... middle of paper ...

...nt of an incident, it should be documented thoroughly, appropriately, and are saved for future use, if necessary. Global Distribution Inc. will establish an Incident Response Team with employees capable of stopping an incident once it has occurred, minimizing damage, documenting information, and restoring services.

Works Cited

(2011). Information security policy templates. Retrieved from http://www.sans.org/security-

resources/policies/

Bayuk, J. (2009, June 16). How to write an information security policy. Retrieved from

http://www.csoonline.com/article/495017/how-to-write-an-information-security-

policy?page=1

Lee, D. (2001). Developing effective information systems security policy. Retrieved from

http://www.sans.org/reading_room/whitepapers/policyissues/developing-effective-

information-systems-security-policies_491

More about Global Distribution Inc.'s Security Policy Regarding Computer Usage

Open Document