Unit 4 Assignment 2

Topics: Personal computer, Virtual private network, Password Pages: 3 (717 words) Published: August 16, 2013
Unit 4 assignment 2
The purpose of this policy is to define standards for connecting to Richman investment’s network from any host. These standards are designed to minimize the potential exposure to Richman investments from damages which may result from unauthorized use of Richman investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman investments internal systems, etc. This policy applies to all Richman investments employees, contractors, vendors and agents with a Richman investments-owned or personally-owned computer or workstation used to connect to the Richman investments network. This policy applies to remote access connections used to do work on behalf of Richman investments, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc. 3.0 Policy 3.1 General

1. It is the responsibility of Richman investments employees, contractors, vendors and agents with remote access privileges to Richman investments's corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to Richman investments. 2. General access to the Internet for recreational use by immediate household members through the Richman investments Network on personal computers is permitted for employees that have flat-rate services. The Richman investments employee is responsible to ensure the family member does not violate any Richman investments policies, does not perform illegal activities, and does not use the access for outside business interests. The Richman investments employee bears responsibility for the consequences should the access is misused. 3. Please review the following policies for details of protecting information when accessing...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Unit 4 Assignment 2 Essay
  • IS3340-Unit 2-Assignment 2 Essay
  • Essay about UNIT 2 Assignment 2
  • unit 7 assignment 4 Essay
  • Unit 2 Assignment 2 Essay
  • Unit 2 Assignment 2 Essay
  • Unit 4 Assignment 1 Essay
  • Unit 4 Essay

Become a StudyMode Member

Sign Up - It's Free
Wolf Creek | ألعاب الطفل | Apple Swot Case Study