Device on the lopes manufacturing network agrees to

This preview shows page 7 - 10 out of 13 pages.

device on the Lopes Manufacturing network, agrees to the following; All persons requesting access to the Lopes Manufacturing Networks from their personal devices agree to allow Lopes Manufacturing to install, maintain and update security software that will only monitor and control Lopes Manufacturing owned data. Lopes Manufacturing reserves the right to delete all Lopes Manufacturing owned data upon notice of lost device, role changes or termination of employment. Lopes Manufacturing reserves the right to create guidelines on accessing the Lopes Manufacturing network from non- Lopes Manufacturing owned devices. All devices that connect to Lopes Manufacturing’s network must have prior authorization with approved documentation. Acceptable Use of Assets The Information Security Officer will ensure that rules for the proper use of Information Technology assets are identified, documented, and implemented the right way within the organization. These rules are made readily available to all information system users. All the users are responsible for their use of any company information processing resources, and of any such use carried out under their username. Lopes Manufacturing requires training prior to providing
network access and that training includes test questions to ensure the user understands the rules of behavior prior to receiving access to the network. Group Policy Object All group policies will be handled by the network security administrator using the Group Policy Management Console from the server. There will be different groups created with different policies assigned to them, for example all HR Accounting will have different policies than the IT Admin group. These GPO’s will keep all workstations and users from accessing any files and folders they are not supposed to. ENFORCEMENT: This policy will be strictly enforced according to the Lopes Manufacturing Human Resources Policy of Disciplinary Action. SECURITY POLICY: To make sure that the organizations information technology assets at Lopes Manufacturing stay secure, the Information Technology Division provides a really good monitoring process. These policies will include tracking and reporting of users using the system correctly. The following measures will make sure that these assurances take place and are enforced in the organization. Information Technology Audits There will be certain audit guidelines to follow that will involve checking on all the organizations operational systems so that nothing gets in the way of the business day to day
operations. Lopes Information Security Officer will ensure that an annual audit program is in place. This program includes a planning and scoping process that will give much details to: • Infrastructure Risks • How a particular staff member is involved • What other projects are currently in play • How currently company issues affect the audit process and how effective it is The Security Policies and Standards

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture