preview

Computer Security: Corporate Security Documentation Suitable for a Large Corporation

Best Essays

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Acceptable Use Policy for Information Technology in the organization ensures that there are no retractions imposed that are contrary to the organizational culture of openness, integrity and trust. This policy governs the organization's internet, intranet, and extranet related systems which includes all computer equipment, software, operating systems, storage media and network accounts, electronic mail, web browsing and TFP. Security includes: PCs, laptops and company workstations which are to be secured with a password protected screensaver with automatic activation feature set at ten minutes or less by logging off unattended host. All host computers will be equipped with an anti-virus program Prohibited Activities (1) violations of the right of any individual or company protected under copyright, trade secret, patent or other type of intellectual property including any similar laws or regulations. (2) unauthorized copying of copyrighted material this includes photographs from magazines, books or other sources under copyright protection as well as music and any copyright software. (3) exporting software, technical information, encryption software or technology in violation of international or regional laws controlling exports. (4) introducing programs that are malicious into the network or server that contain any types of virus, worm, Trojan horse, email bomb or any other type

Get Access