The purpose of this document is to assist Yummy Good Treats in mitigating the risks associated with the technologies used for remote access communications. The document emphasizes the importance of securing sensitive information stored on these devices and transmitted through remote access across external networks. This document provides recommendations for creating policies and for selecting, implementing, and maintaining the necessary security controls for remote access servers and clients.
This document is primarily intended for employees who use laptops with wireless internet connections and mobile phones to communicate with the intranet to retrieve confidential price lists and inventory information from headquarters; …show more content…
Take reasonable steps to keep log files secure, and physically secure equipment.
10. Implement basic logging for all remote access systems and remote access sessions.
Authorization Access and use of Equipment and Resources
All users with access to confidential data should utilize all necessary precautions to keep the accuracy, integrity, and confidentiality of the data and ensure that no unauthorized leak occurs.
Users should be aware that all systems and networks are being monitored and reviewed by system administrators; this includes all documents created, stored, transmitted or received on Yummy Good Treats computers and networks.
Protection and privacy:
Each user will be responsible for the security and integrity of information stored on his/her personal desktop system.
a. making regular backups of information and files
b. controlling and securing physical and network access to Yummy Good Treats resources and data
c. logging out of sessions
d. if a user suspects that their access codes have been compromise or that there has been unauthorized activity on their accounts, they are to report it to the Information Security department and change access codes at once.
Restrictions
All users must not:
1. Provide access codes to any non employee …show more content…
Participate in activities that harass, degrade, intimidate, insult, interfere with, or threaten others.
Violations of Yummy Good Treats policies will result in one or more of the following actions:
1. User will be notified that the misuse has been detected and that it must stop
2. The user’s work will be more carefully monitored.
3. The user will be denied access temporarily or permanently.
4. The appropriate disciplinary action will be initiated. Actions can include termination of employment.
5. Legal actions could be initiated for prosecution.
All users should report to their managers and/or Help Desk any suspected violations of Yummy Good Treats computer policies, such as illegal access attempts. Users should be expected to assist the system’s administrators during any investigations of a system misuse.
If a system administrator has proof of the misuse of Yummy Good Treats resources and that proof points to a specific person, the admin is required to notify the security administrator in charge. During the violator’s examination, the user's remote access privileges could be restricted or suspended.
Yummy Good Treats retains absolute right to define what make up proper use of their