Saturday, March 9, 2019
It 255 Final Project
Dear Richman Investments Senior Management, It has come to my assist that your corporate security insurance for the firm is out of date and that it demand to be updated. In my time here as an intern I acquire reviewed the security policy and revised it to keep up with alone of the technological updates going on in the earnings world today. I was assigned this project and being that we have 5000 employees operating in diametric locations and different parts of the country I have noniced that m either of the other branches do non follow the firms policies as they should.Some branches operate on their own policies. I have drafted up a new and better corporate security policy that covers emails, mobile devices, computer usage, email guardianship policies, countersigns, and so ontera I hope this will help streamline our security policy across the board so that everyone is on the same page and so there is no misinterpretation of the firm employee or otherwise. RICHMAN INVES TMENTS integrated SECURITY POLICY Use of Phone and Mail Systems private friendly function of the telephone for long-distance and toll c in alls is not permitted.Employees should Practice discretion when qualification local personal calls and whitethorn be required to reimburse The profligate for some(prenominal) charges resulting from their personal subprogram of the telephone. The mail system is reserved for disdain purposes only. Employees should refrain from sending or receiving personal mail at the workplace. To master effective telephone communications, employees should always character the approved greeting and talk in a courteous and professional manner. Please confirm development received from the caller, and hang up only after the caller has do so.Computer and E-mail Usage Computers and other media of electronic communications (Media) are the office of the unwaveringly which has a legitimate course interest in the priggish utilization of its property. Ther efore, any use of the soakeds property, and any electronic communications move or received, may be monitored by persons authorized by the Firm. Employees who use such(prenominal) Media for private, non-work related purposes do so at their own risk. The Firm encourages such Media to be used for business purposes and forbids the waste or monopolization of such resources.Electronic communications, including computer files, voicemail and electronic mail (e-mail), are not anonymous sender and receiver can be determined, and the content of any message may be viewed by others within the Firm. A password is not intended to ensure the loneliness of electronic communications. Instead, it serves to provide a minimum level of security to the Firms Media by restricting entrance fee to those who contribute valid passwords. Preventing a person from foreign of the Firm from gaining access to the Firms Media is not the same as affording privacy to the communications of Media users.The Firm str ives to maintain a workplace which is free of molestation and sensitive to the diversity of its employees. Therefore, the Firm prohibits the use of computers and the e-mail system in ways that are disruptive, offensive to others, or harmful to morale. For example, the display or transmission of sexually explicit images, messages, and cartoons is not allowed. Other such misuse includes, but is not limited to, cultural slurs, racial comments, off-color jokes, or anything that may be construed as harassment or showing disrespect for others.In addition, e-mail may not be used to solicit others for commercial ventures, religious or political causes, outside organizations, or other non-business matters. E-MAIL IS NOT A PRIVATE confabulation WITHIN THE FIRM. NEVER USE E-MAIL TO SEND PERSONAL development OR DISCUSS PRIVATE MATTERS ABOUT ANYONE, INCLUDING YOURSELF, UNLESS DISCLOSURE OF THAT INFORMATIONWITHIN THE FIRM IS satisfactory TO YOU. THIS PROHIBITION ALSO APPLIES TO VOICEMAIL AND COMPUTER FILES. ANY DEFAMATORY, INSULTING OR derogatory REMARK ABOUT ANY PERSON OR GROUP OF PERSONS IS PROHIBITED.Email memory board constitution Because the volume of e-mails sent and received continues to rise, the size of attachments Continues to grow, and pictures and images consume probatory amounts of storage space, the Firm has Adopted an Email computer storage Policy that addresses retaining, deleting and frugality e-mail in an effort to Advance the Firms technology objectives and ensure that a reliable network exists for rapid message exchange and communication. The Email Retention Policy allows a faster, more responsive e-mail system and ensures that, in the event of a disaster (i. . heavy(p)ware failure, natural disaster events, etc. ), our messaging services can be quickly restored to operation. This policy as well encourages organization of e-mail through the use of email folders. The policy is knowing to automatically delete cultivation from only the Inbox, Sent Items and Deleted Items as they age. The send back below illustrates the policy and aging and flow of email items from those folders. Software Policy The Firm will not tolerate any employee making illegitimate copies of bundle.The Unauthorized duplication of software baffles software licensing agreements and federal copyright justnesss. such conduct is not only against the Firms policy, it is a federal criminal offense. No employee shall install any software on any computer at the offices of the Firm unless the installation is approved in writing in upgrade of the installation. Social Media Policy Although this is not a complete or double-dyed(a) list, employees should catch the following guidelines prior to using social media (including Firm operated social media) while an employee of the Firm.Employees should be aware that while not always apparent, work-related issues may often be implicated by their use of social media. In all instances, employees are expected to u se good judgment and to consider the effect their social media use has on others and the way in which others cover them. Stay Legal Employees should make sure that their use of social media complies with all applicable laws. When in doubt, the employee should find out whether what he/she is doing is legal forrader proceeding.Confidentiality An employees confidentiality obligations extend to his/her online activities. Accordingly, employees should be familiar with the Firms policies regarding confidential information. Generally speaking, an employee should not violate to any third party any information related to the Firm or its employees, products, services, clients, partners, suppliers, or other business interests unless that information is already humanity knowledge.Even if the information is public, an employee should avoid discussing the Firms clients, suppliers, and partners without their permission. If in doubt about whether particular information may be disclosed, contac t a Managing Partner. Copyrights, Trademarks, and Intellectual Property Employees should not make any use or reproduction of any copyright, trademark, or intellectual property belonging to any other person or entity, except in accordance with applicable law. NO EXPECTATION OF PRIVACYFirm employees should have no expectation of privacy with respect to any information created, viewed, distributed, received, uploaded, downloaded, accessed, or otherwise facilitated by the Firms Computer or Information Systems (phone, computer, hand-held devices, etc. ). Similarly, employees should have no expectation of privacy with respect to information that is generally available online. The Firm reserves the right to monitor and maintain any content created, viewed, distributed, received, uploaded, downloaded, accessed, or otherwise involving any Firm Computer or Information System or resource.DISCIPLINARY ACTION Any violation of this policy may result in disciplinary action, up to and including t ermination of employment. meshing Policy For those employees who are provided access to the internet, the Firm encourages the use of the internet for business purposes. Non-business use (such as net surfing for personal enjoyment, entertainment, or childrens give instruction projects) should be kept to a minimum and generally restricted to non-working time. Personal use of the internet that adversely affects an employees productivity is prohibited.No employee may use the internet during working time or during non-working time to access or begin information in violation of any Firm policy. Examples of the types of information that would violate Firm policies include information that is sexually explicit or offensive, or which is offensive, hostile, or harassing with respect to anyones race, religion, color, creed, marital status, sex, ancestry, national origin, age, disability, sexual orientation or preference, veterans status, or any other aspect that is protected by law or by th e Firms policies.No employee may use the internet during working or non-working time to access or convey information in an unconventional manner or for any unlawful purpose, such as downloading or copying information or programs in violation of copyright and software licensing laws, or using the internet to distribute or receive damaging programs such as viruses. Remember that you should not expect any privacy in your use of the internet.The Firm has the ability to monitor your internet access (all messages sent, sites accessed, and information downloaded). The Firm reserves the right to review and disclose such records or information with or without prior key out or consent. Your terrible drive contains a history of sites recently visited and information (such as school text and graphics) from those sites. This information is the Firms property.The Firm has the right to enter your workstation or office, with or without notice or consent, at any time, and to access, monitor, re view and take possession of your hard drive and any data storage medium. (For example, hard drives, floppy disks, CD-ROMs, videotapes, cassette tapes, etc. ) Anything on Company premises is presumed to be Company property and is cover by this policy. I hope this proposal meets all of your contractual needs and gets everyone on the same page. Thank you.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment