Comply with company policies and protects the company

This preview shows page 10 - 13 out of 15 pages.

comply with company policies and protects the company against damaging legal issues.Before receiving their network IDs, users should agree to the following code of conduct:Do not use the service to violate any laws.Do not breach the security of any computer network or user.Do not send junk e-mail, spam or disrupt/disturb any other user on the system.Do not reveal personal information that could end in a case of identity theft.always Use appropriate/polite language staying professional.Users should be aware of what the company describes as unacceptable behaviour. These areto include the creation and broadcast of offensive, obscene, or indecent documents andimages, including the creation and transmission of material designed to causeinconvenience, disturbance or anxiety. The creation of defamatory material, the creationand transmission that infringes the copyright of another person, the transmission ofunwanted commercial or advertising and deliberate unauthorized access to other servicesavailable using the connection to the network/Internet, any type of activity that uses thenetwork to waste time for the technical support dep. to troubleshoot a problem for whichthe user is guilty in causing, corrupting or destroying other user's information, violating theprivacy of others online, using the network in such a way that it rejects the service to others,continuing to use software or other system tools when you have continuously been warnedfor using, and any other misuse’s of the network such as inserting viruses.C o m p a n yM a n u a lP a g e| 10
CYBERLEET TRAINING MANUAL3.3 User Training PoliciesHuman Resources will determine and send out announcements of who needsto be trained.Initial basic training will occur for each new hire as they start with thecompany. For existing employees, each department will practice a bi-yearly trainingmeeting of basic company policies and compliance.Each security awareness training module will address confidentiality(protecting the data from disclosure to unauthorized parties), integrity (protectingdata from being modified by unauthorized parties), and availability (ensuring thatauthorized parties can access the data when desired).Government associated employees will be required to follow government guidelinesand training, along with Cyberleet’s normal training policies.C o m p a n yM a n u a lP a g e| 11
CYBERLEET TRAINING MANUAL3.4 Basic User PoliciesTo prevent security breaches such as piggybacking and tailgating, each person entering thebuilding needs to be identified. There are several ways to implement this: door key codelocks, which authenticate people by either entering a key code or by displaying a card to acard reader, or depending on the organization’s needs for a more secure option, manual orautomatic mantraps (also known as airlocks, which create a security buffer zone betweentwo different areas by implementing a small space between two sets of interlocking doors)and access lists (posting a guard at the access point to your facility and whenever anyoneenters the facility, they have to sign in and then they leave, they have to sign out, which

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 15 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture