ipl-logo

Widgets International Business Report

674 Words3 Pages

Section 1 - Introduction
Widgets International provides various computer resources to its employees for the purpose of using it in a productive manner. Widgets International wants to make sure each employee reads and understands the company’s policy.
This Computer Use Policy contains four policy directives. Part I – General guidelines, Part II – User not required, Part III – internet access, and network security procedures and recommendation, and Part IV – security. .
Part I - General Guidelines
1. The e-mail and internet systems of Widgets International will be used for business purposes only.
2. The tools provided of the company is to be used for the enhancement of the company as well as your job at Widgets International.
3. The …show more content…

Without noticed things will be monitored for security and network daily by network administrators.
5. All data is property of Widgets International.
6. Personal computer usage will be monitored for site visited, date, and time of visit and duration of time spent.
7. Managers, in cooperation with Security Management Division, are required to train employees on policy and document issues with Policy compliance.
Part 2 – Users Not Required
1. Use company’s computers and software for personal use.
2. Use company’s network and systems for illegal purpose, unlawful, non-job related purposes, and threating.
3. Use of messaging or other communication services to intimidate, harass in any form.
4. Accessing another user’s computer or files without consent of the signed user or manager.
Part 3 – Internet Access

1. Certain contain that is inappropriate, and may impose a threat will be filtered.
2. Social media, and chat lines are prohibited.
3. Downloading things from the internet is permitted with the company being advised.
4. Unless used for personal use is prohibited.
5. Visiting inappropriate sites during and on company’s computers could result in disciplinary action or …show more content…

ProSECURE® UTM firewalls is a great for anti-virus, anti-spam, web filtering, and intrusion prevention, IPS for protection against today’s application, web,email and network threat protection.
With the “built-in application firewall of the UTM overcomes old firwall and allows UTM to monitor, control, and block hundreds of application such as skype, Facebook, BitTorrent, and yahoo messenger all to enhance employee’s productivity and to enforce network usage policies” ("NETGEAR," n.d.).
Part 4 – Security

With the way the “internet age has led to enormous social and economic benefits, has introduced numerous new challenges” ("Cisco Systems," n.d.). These steps must be followed properly to not risk possible network security issues such as security threats, identify theft, financial fraud, spam, and viruses.

1. Users are responsible for understanding these security guidelines and maintaining of the security of the company’s system their using.
2. Users are responsible for his or her password. Under NO CIRCUMSTANCE it is to be given to another user unless IT or a manger.
3. Passwords are checked periodically and changed for security

Open Document