Access Millions of academic & study documents

Computer and Internet Security Policy Paper

Content type
User Generated
Subject
Computer Science
Type
Research Paper
Showing Page:
1/6
Computer and Internet Security Policy
Student’s Name
Institution
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/6
Computer use Policy
All computer equipment (servers, stationary and laptop computers), peripheral equipment
(printers, scanners, multifunction devices ), accessories (mouse-type manipulators, trackballs,
optical disk drives), communication equipment (network adapters, switches, hubs, gateways ),
for the purposes of this Policy, are collectively referred to as “computer hardware”. The
computer equipment provided by the Company is its property and is intended for use exclusively
for production purposes (Ciampa, 2012).
Users of laptop computers containing the Company’s service information are required to ensure
their storage in physically protected rooms, lockable desktop drawers, cabinets or to protect them
using a protective device of the same degree of effectiveness when this computer is not used.
Each employee who receives a laptop computer is required to take appropriate measures to
ensure its safety, both in the office and in the place of residence. In situations where the risk of
theft of laptop computers increases, for example, in hotels, airports, in the offices of business
partners, etc., users must under no circumstances leave them unattended.
When traveling in a car, the laptop computer must be in the trunk. At night it should be
transferred from the car to the hotel room.
All computers must be password protected when the system boots, is activated by a hot key, and
after exiting the “Screen Saver” mode. To set protection modes, the user must contact technical
support. Data should not be compromised in case of negligence or negligence resulting in loss of
equipment. Before disposal, all equipment components that include data storage media
(including hard drives) must be checked to ensure that they do not contain confidential data and

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/6

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 6 pages?
Access Now
Unformatted Attachment Preview
Computer and Internet Security Policy Student’s Name Institution Date Computer use Policy All computer equipment (servers, stationary and laptop computers), peripheral equipment (printers, scanners, multifunction devices ), accessories (mouse-type manipulators, trackballs, optical disk drives), communication equipment (network adapters, switches, hubs, gateways ), for the purposes of this Policy, are collectively referred to as “computer hardware”. The computer equipment provided by the Company is its property and is intended for use exclusively for production purposes (Ciampa, 2012). Users of laptop computers containing the Company’s service information are required to ensure their storage in physically protected rooms, lockable desktop drawers, cabinets or to protect them using a protective device of the same degree of effectiveness when this computer is not used. Each employee who receives a laptop computer is required to take appropriate measures to ensure its safety, both in the office and in the place of residence. In situations where the risk of theft of laptop computers increases, for example, in hotels, airports, in the offices of business partners, etc., users must under no circumstances leave them unattended. When traveling in a car, the laptop computer must be in the trunk. At night it should be transferred from the car to the hotel room. All computers must be password protected when the system boots, is activated by a hot key, and after exiting the “ ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4