Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Instructions Complete the Security Policy. Add at least one additional policy to each section (General and Security and Proprietary Data Policies) Add at least one
Instructions
Complete the Security Policy.
- Add at least one additional policy to each section (General and Security and Proprietary Data Policies)
- Add at least one additional bullet item under both Unacceptable Use and List of Approved Company Issued USB Devices.
- Elaborate on Bluetooth, Cellphone and Wifi Policy under the Security and Proprietary Data Policies section.
- How would you enforce these policies?
Security Policies
General Policies
- Proprietary information stored on company owned or leased assets remains the sole property of the company. This includes information produced by employees or third parties.
- All activity on company owned or leased assets is subject to monitoring, including logs, emails, and instant message conversations.
- USB devices permitted to connect to company owned or leased assets shall be approved by the Security department. USB audio output devices are limited to approved headphones.
- A company owned or leased asset will not be used to process information that may be found to be offensive, or illegal.
Security and Proprietary Data Policies
- Company owned or leased assets must have the most current versions of approved software installed.
- User password must be changed every 60 days.
- User sessions will automatically timeout after 3 minutes of in-activity. Company owned or leased assets that require authentication will screen lock after 60 seconds of inactivity.
- Employees of the company shall submit to usage of two-factor authentication.
- Permission to visit blocked web sites may be obtained with legitimate business need, and after thorough security vetting.
- Bluetooth policy.
- Cellphone policy.
- Wifi policy.
Unacceptable Use
- Using company owned or leased assets for access personal social media, peer to peer file sharing, online shopping, file-sharing (such as dropbox), personal email or computer entertainment is prohibited. Using said assets in a willfully destructive or illegal manner is strictly prohibited.
- Unapproved or unauthorized USB devices are not permitted to be connected to company owned or leased assets.
- USB Headphones are not permitted, use only headphones with a standard audio connector (3.5 mm).
List of Approved Company Issued USB Devices
- Mouse
- Keyboard
- Monitor
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started