As a user of the company network you have the following obligations:
1) To answer for your personal account granted to you by CRI company.
2) To keep confidentiality of company’s information, maintaining its integrity and keeping information from being accessed by non-authorized users.
3) To keep confidential the password given to you to access the resources and information systems of the organization, informing immediately to the Network Administrator or any other responsible personal if any issue surge related to your password privacy. Your personal password is to be kept confidential and it is non-transferable. DO NOT share your password with anyone.
4) To inform immediately over any failure on the systems within …show more content…
6. USE OF OTHER NETWORKS:
CRI's offer remote access services when needed to any authorized personnel. CRI business allows the use of external resources to conduct business but require that a formal request be presented for authorization from IT Manager. These are some requirements to be followed in order to keep company’s confidentiality and integrity while using other networks:
• Encryption: Secure remote access must be firmly controlled with encryption for example, by using Virtual Private Networks.
• Passwords: Must use strong and very secure passwords and keep them safe at all times. Passwords cannot be stored in an easy to find location and should never be shared; not even with family members.
• Employees that need to use private equipment and connect to the company network must meet company’s security policy for owned equipment remote access and be aware of the risks of exposing company information and its consequences.
• Hosts using company or private computer to connect to CRI internal networks via remote access must be protected by using the most recent and powerful anti-virus …show more content…
BYOD
CRI employees have the opening to use their own electronic devices for work purposes when authorized. Personal electronic devices include personally owned laptops, computers, cellphones, tablets, and smartphones. There are some limitations for the use of BYOD policy. Be aware that if you want to take advantage of this policy you will have to follow these rules thoroughly.
1) Ensure the security of CRI information, authorized employees are required bring in their devices for our IT manager to install the required security software (Anti-virus, sec VPNs, software firewall, etc.)
2) Do not use cloud based applications to store company information. These services may transfer data to not secure parties.
3) Do not share your data (do not synchronize) with other devices at home or any other places; not even with family and friends. By doing this you are inviting others to your share your network and facilitating the way for intrusions.
4) Throughout work hours, employees must keep to the minimum the usage of private devices for personal motives. We understand it is your device but you still need to comply with the rules of electronical usage in the CRI - Policy and Procedure