preview

Security Must Grow with Technological Advancement

Best Essays

Introduction
Today we live in a world where new technology is no stranger to our everyday lives and as technology continues to grow, security needs to evolve with it. Security is one of the most important aspects of a company needed to succeed. The internet as we know can be the chance for opportunity for a business to constantly make money whether it’s the day or the night but the internet also holds the opportunity for an unwanted guest or an intruder to access the company networks. There is a need for a clear cut relationship between techniques and technologies that ensures protection to the company and allows the company to continue its daily services.
Purpose

This policy is an outline for the operation of information security …show more content…

Personal Information
Personal data is very sensitive data and would be requiring the high degree of security. It is required that appropriate measures are taken against unauthorized or unlawful processing of personal data and against accidental loss or destruction, or damage to, personal data. Personal data is any information relating to persons, ethnic or racial origin, religious beliefs, Physical or mental health, sexual life, political opinions, trades union membership and criminal offences.

Security Policy Overview

Access Control
• Identification – All employees and visitors will need a valid Identification card. An identification card will be issued to an employee on the first day of work. All visitors will need to obtain a visitor pass from the work sites front desk. The identification card allows an employee to get pass the lobby and also allows access to different rooms based on permissions.
• Username and Password – All employees will need a username and password to gain access to The Conference Board’s network. Usernames will be an employee’s last name and first initial Employees passwords will be “HelloWorld1” and will be prompt to change upon first time log on. Employees are advised to never share their password.
• Permissions – Employees will need permission to access different folders on the network.

Get Access