Saturday, May 25, 2019
It 255 Final Project
Dear Richman Investments Senior Management, It has come to my attention that your corporate security policy for the firm is out of age and that it needs to be updated. In my time here as an intern I have reviewed the security policy and revised it to keep up with every of the technological updates going on in the inter winnings world today. I was assigned this project and being that we have 5000 employees operating in unalike locations and different parts of the country I have noticed that some of the other branches do not follow the firms policies as they should.Some branches operate on their own policies. I have drafted up a new and improved corporate security policy that covers e get aways, mobile devices, computer usage, email retention policies, passwords, and so on I accept this will help streamline our security policy across the board so that everyone is on the same page and so there is no misapprehension of the firm employee or otherwise. RICHMAN INVESTMENTS CORPORATE S ECURITY POLICY Use of Phone and Mail Systems Personal use of the telephone for long-distance and toll calls is not permitted.Employees should arrange discretion when making local personal calls and whitethorn be required to reimburse The wet for all charges consequenceing from their personal use of the telephone. The mail system is reserved for business purposes only. Employees should refrain from sending or receiving personal mail at the workplace. To ensure tack togetherive telephone communications, employees should always use the approved greeting and direct in a courteous and professional manner. Please confirm information received from the caller, and hang up only after the caller has done so.Computer and electronic mail Usage Computers and other media of electronic communications (Media) are the attribute of the Firm which has a legitimate business interest in the proper utilization of its property. Therefore, each use of the Firms property, and any electronic communi cations sent or received, may be monitored by persons authorized by the Firm. Employees who use such Media for private, non-work related purposes do so at their own risk. The Firm encourages such Media to be used for business purposes and forbids the waste or monopolization of such resources.Electronic communications, including computer files, voicemail and electronic mail ( electronic mail), are not anonymous sender and receiver can be determined, and the nitty-gritty of any message may be viewed by others at bottom the Firm. A password is not intended to ensure the privacy of electronic communications. Instead, it serves to provide a minimum level of security to the Firms Media by restricting attack to those who bear valid passwords. Pr eccentricing a person from outside of the Firm from gaining access to the Firms Media is not the same as affording privacy to the communications of Media users.The Firm strives to maintain a workplace which is free of harassment and sensitive to the diversity of its employees. Therefore, the Firm prohibits the use of computers and the e-mail system in ways that are disruptive, offensive to others, or catastrophic to morale. For example, the display or transmission of sexually explicit images, messages, and cartoons is not allowed. Other such misuse includes, but is not limited to, ethnic slurs, racial comments, tasteless jokes, or anything that may be construed as harassment or showing disrespect for others.In addition, e-mail may not be used to solicit others for commercialised ventures, religious or political causes, outside organizations, or other non-business matters. email IS NOT A PRIVATE COMMUNICATION WITHIN THE FIRM. NEVER USE E-MAIL TO SEND PERSONAL INFORMATION OR DISCUSS PRIVATE MATTERS ABOUT ANYONE, INCLUDING YOURSELF, UNLESS DISCLOSURE OF THAT INFORMATIONWITHIN THE FIRM IS ACCEPTABLE TO YOU. THIS PROHIBITION ALSO APPLIES TO VOICEMAIL AND COMPUTER FILES. ANY DEFAMATORY, injure OR DEROGATORY REMARK ABOUT ANY PERSON OR GROUP OF PERSONS IS PROHIBITED.Email Retention Policy Because the volume of e-mails sent and received continues to rise, the size of attachments Continues to grow, and pictures and images go through significant amounts of storage space, the Firm has Adopted an Email Retention Policy that addresses retaining, deleting and saving e-mail in an effort to Advance the Firms technology objectives and ensure that a reliable network exists for rapid message exchange and communication. The Email Retention Policy allows a faster, more responsive e-mail system and ensures that, in the event of a disaster (i. . hardware failure, natural disaster events, etc. ), our mess senescence services can be quickly restored to operation. This policy also encourages organization of e-mail through the use of email folders. The policy is designed to automatically delete information from only the Inbox, Sent Items and Deleted Items as they age. The Table below illustrates the policy and aging and f low of email items from those folders. Software Policy The Firm will not tolerate any employee making unauthorized copies of packet.The Unauthorized duplication of software violates software licensing agreements and federal copyright laws. Such conduct is not only against the Firms policy, it is a federal criminal offense. No employee shall install any software on any computer at the offices of the Firm unless the installation is approved in writing in advance of the installation. Social Media Policy Although this is not a complete or exhaustive list, employees should consider the following guidelines prior to using social media (including Firm operated social media) while an employee of the Firm.Employees should be aware that while not always apparent, work-related issues may often be implicated by their use of social media. In all instances, employees are expected to use good judgment and to consider the effect their social media use has on others and the way in which others perc eive them. Stay Legal Employees should make sure that their use of social media complies with all applicable laws. When in suspect, the employee should find out whether what he/she is doing is legal before proceeding.Confidentiality An employees confidentiality obligations extend to his/her online activities. Accordingly, employees should be familiar with the Firms policies regarding confidential information. Generally speaking, an employee should not disclose to any third fellowship any information related to the Firm or its employees, products, services, clients, partners, suppliers, or other business interests unless that information is already public knowledge.Even if the information is public, an employee should avoid discussing the Firms clients, suppliers, and partners without their permission. If in doubt about whether particular information may be disclosed, contact a Managing Partner. Copyrights, Trademarks, and Intellectual Property Employees should not make any use or echo of any copyright, trademark, or intellectual property belonging to any other person or entity, except in accordance with applicable law. NO expectation OF PRIVACYFirm employees should have no expectation of privacy with respect to any information created, viewed, distributed, received, uploaded, downloaded, accessed, or otherwise facilitated by the Firms Computer or Information Systems (phone, computer, hand-held devices, etc. ). Similarly, employees should have no expectation of privacy with respect to information that is generally available online. The Firm militia the right to monitor and maintain any content created, viewed, distributed, received, uploaded, downloaded, accessed, or otherwise involving any Firm Computer or Information System or resource.DISCIPLINARY ACTION Any violation of this policy may result in disciplinary action, up to and including termination of employment. Internet Policy For those employees who are provided access to the internet, the Firm en courages the use of the internet for business purposes. Non-business use (such as net surfing for personal enjoyment, entertainment, or childrens school projects) should be kept to a minimum and generally restricted to non-working time. Personal use of the internet that adversely affects an employees productivity is prohibited.No employee may use the internet during working time or during non-working time to access or convey information in violation of any Firm policy. Examples of the types of information that would violate Firm policies include information that is sexually explicit or offensive, or which is offensive, hostile, or harassing with respect to anyones race, religion, color, creed, marital status, sex, ancestry, national origin, age, disability, sexual orientation or preference, veterans status, or any other aspect that is protected by law or by the Firms policies.No employee may use the internet during working or non-working time to access or convey information in an unlawful manner or for any unlawful purpose, such as downloading or write information or programs in violation of copyright and software licensing laws, or using the internet to distribute or receive destructive programs such as viruses. Remember that you should not expect any privacy in your use of the internet.The Firm has the ability to monitor your internet access (all messages sent, sites accessed, and information downloaded). The Firm reserves the right to review and disclose such records or information with or without prior notice or consent. Your hard drive contains a history of sites recently visited and information (such as text and graphics) from those sites. This information is the Firms property.The Firm has the right to enter your workstation or office, with or without notice or consent, at any time, and to access, monitor, review and let possession of your hard drive and any data storage medium. (For example, hard drives, floppy disks, CD-ROMs, videotapes, cassette tapes, etc. ) Anything on Company premises is presumed to be Company property and is covered by this policy. I hope this proposal meets all of your contractual needs and gets everyone on the same page. Thank you.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment