Unit 3 Corresponding Commies

Improved Essays
4. CORRESPONDING DUTIES:

As a user of the company network you have the following obligations:

1) To answer for your personal account granted to you by CRI company.
2) To keep confidentiality of company’s information, maintaining its integrity and keeping information from being accessed by non-authorized users.
3) To keep confidential the password given to you to access the resources and information systems of the organization, informing immediately to the Network Administrator or any other responsible personal if any issue surge related to your password privacy. Your personal password is to be kept confidential and it is non-transferable. DO NOT share your password with anyone.
4) To inform immediately over any failure on the systems within
…show more content…
6. USE OF OTHER NETWORKS:

CRI's offer remote access services when needed to any authorized personnel. CRI business allows the use of external resources to conduct business but require that a formal request be presented for authorization from IT Manager. These are some requirements to be followed in order to keep company’s confidentiality and integrity while using other networks:

• Encryption: Secure remote access must be firmly controlled with encryption for example, by using Virtual Private Networks.
• Passwords: Must use strong and very secure passwords and keep them safe at all times. Passwords cannot be stored in an easy to find location and should never be shared; not even with family members.
• Employees that need to use private equipment and connect to the company network must meet company’s security policy for owned equipment remote access and be aware of the risks of exposing company information and its consequences.
• Hosts using company or private computer to connect to CRI internal networks via remote access must be protected by using the most recent and powerful anti-virus
…show more content…
BYOD

CRI employees have the opening to use their own electronic devices for work purposes when authorized. Personal electronic devices include personally owned laptops, computers, cellphones, tablets, and smartphones. There are some limitations for the use of BYOD policy. Be aware that if you want to take advantage of this policy you will have to follow these rules thoroughly.

1) Ensure the security of CRI information, authorized employees are required bring in their devices for our IT manager to install the required security software (Anti-virus, sec VPNs, software firewall, etc.)
2) Do not use cloud based applications to store company information. These services may transfer data to not secure parties.
3) Do not share your data (do not synchronize) with other devices at home or any other places; not even with family and friends. By doing this you are inviting others to your share your network and facilitating the way for intrusions.
4) Throughout work hours, employees must keep to the minimum the usage of private devices for personal motives. We understand it is your device but you still need to comply with the rules of electronical usage in the CRI - Policy and Procedure

Related Documents

  • Improved Essays

    Ilab 5 jerry Metcalf Keller Graduate School of Management Professor: Gregory Gleghorn 6/4/2017 VPN Connection The type of VPN connection solution that we will be using to connect user to the internet work will be the Cisco Any connect client and the RSA secureID. We will be going in to detail of how the connection process goes and also how to configure it. Both clients are required in order for the user to authenticate and connect to the company network. When the user is connected they will be able to do their job remotely and send and retrieve information remotely.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Many of these concerns may be remedied by simply revisiting the company policies and procedures. Data loss is a serious problem. Typically large companies have an automatic data backup in place. Proper automatic backups can be set up daily, weekly, or monthly. For this size company, I would recommend daily backups.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    At no time should the workstation be used for personal email use, (i.e. sending or receiving), or social networking sites. The company has a secondary Internet Service Provider (ISP), and that should be used for personal email and social networking via your personal devices, such as cell phones and tablets. Again, you are not permitted to send company information using personal devices or email/social media. Key Control Maintaining constant watch over who has access to what electronic and physical key access is imperative.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    Sub section 9.1.02.01 – Warning Banners Current Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers,desktops, VPN connections, network devices). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government regulations and UnitedHealth Group directives. Modify Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers, desktops, VPN connections, network devices, application elevations). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Remote access to the UHS FUSION/Cerner Millennium Application Portal is available with the use of Citrix Web-Plugin once the user requests access through the Information Technology department. All passwords created to access the portal, which expires every 90 days, must be strong passwords in order maintain secure and protection from unauthorized access, as well as confidentiality. Since electronic health records are easier to access, making them also easer to exploit, access to patient information is based on criteria that is relevant to an individual’s position. As an additional measure of security, an Information Technology Security Officer conducts audits to the computer system’s activity at Summerlin Hospital Medical Center to check for any signs of abuse of the security policy. Other improved patient information security measures have been bar code technology in order to verify the medication and dosage, as well as warnings that alert healthcare providers about allergies and…

    • 1863 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    Data Confidentiality: When you keep important data it is important that the data doesn’t go out to the wrong hands. So if a business data is suddenly leaked online or maybe stolen, then this can result in a huge loss for the business and this can potentially put the business out of business. To overcome this problem, then you would need a good security program which can safeguard against any breach in confidentiality. Data Integrity: This is used to ensure that the most important data is secure and also makes sure that the data isn’t messed around with. If any of the data has been messed around with then this can result in major problems.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Images can be used to hide information from programmers. And finally, be careful when getting rid of old machines. These three things are important to note when trying to keep your personal information…

    • 607 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Record360 Privacy Policy

    • 1061 Words
    • 5 Pages

    We may collect and possess personal information about employees of a Client that are users of our services (“User Information”). User Information may include contact information including the name of employees, your job titles or roles, phone numbers and email address. The source of the User Information is you as the individual user or your employer. We collect and process User Information for the purposes of providing our services and securing access to the services. We may legally collect this personal information by consent and for proper delivery of our services and for monitoring and ensuring the security the…

    • 1061 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The mission statement of the Tennessee Department of Safety and Homeland Security, which is the statement, which is used as a way of communicating the purpose of the organization is as follows: Mission Statement To serve, secure, and protect the people of Tennessee ("Tennessee Department of Safety and Homeland Security Mission Statement," 2014). The Tennessee Department of Safety and Homeland Security currently doesn’t have an official goals or value statement. Employees of the State of Tennessee are expected to act in a manner that will enhance the name, service and general impression of the State in the eyes of the general public. This Code of Conduct provides general rules of conduct based on fundamental ethical principles.…

    • 945 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    This is ensuring no other patient or member of staff can access private files and it is to protect information. Computers within…

    • 2083 Words
    • 8 Pages
    Superior Essays
  • Great Essays

    Why Collect HR Data

    • 1110 Words
    • 5 Pages

    Data Protection Act This act applies to all organisations that process data relating to their staff and customers. It is the main legal framework in UK that protects personal data. The act contains 8 data protection principles which are: Personal data should be processed fairly and lawfully, this can be achieved by asking the employees to use their information, on the employment contract.…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Serious Conundrum

    • 421 Words
    • 2 Pages

    You can also use a password manager from a managed IT company, such as our company in San…

    • 421 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Confidentiality: Only the authorized people can access the data, no other persons cannot access the data or accounts. Integrity: only the authorized person can change the data, no other people cannot access it. Availability: The data should be available to the authorized users 24/7.…

    • 342 Words
    • 2 Pages
    Decent Essays