All Irishman Investments agents, vendors, contractors, and employees, who use either Irishman Investments company property or their own personal property to connect to the Irishman Investments network, are governed by this policy. The scope of this policy covers remote connections, used to access or do work on behalf of Irishman Investments, including, but not limited to, the viewing or sending of e-mail, and the viewing of intranet resources.
Policy: Irishman Investments agents, vendors, contractors, and employees with privilege to remote access to Irishman Investments’ corporate network are responsible for insuring that they adhere to these standards, whether using company-owned or personal equipment for data access, and that they follow the same guidelines that would be followed for on-site connections to the Irishman Investments network.
General access to the Internet by household members via the Irishman Investments network will be permitted, and should be used responsibly, such that all Irishman Investments standards and guidelines are enforced for the duration of Internet activity.
The Irishman Investments agent, vendor, annotator, or employee will bear any responsibilities and consequences for any misused access. Requirements: * Remote access must be secure and strictly controlled. Enforcement of control will be via password authentication or private/public keys with strong pass- phrases. Irishman Investments employees should, at no time, provide their security password(s) to another individual, including family members. * An up-to-date anti-virus software package must be used on all hosts connected to Irishman Investments’ networks remotely, which includes personal equipment. Should personal equipment be used to connect to Irishman Investments’ networks remotely, that equipment must meet the requirements that equipment otherwise owned by Irishman Investments would meet.
Cite this Enhance and Existing It Security Policy Framework Essay
Enhance and Existing It Security Policy Framework Essay. (2018, Jul 01). Retrieved from https://graduateway.com/enhance-and-existing-it-security-policy-framework/