You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal web-based email account. He followed a link in a spam email, downloaded games to his hard disk, and inadvertently infected the computer with malware, which spread to the network server.

The security officer at Richman has asked you to research and to define "the acceptable use of Richman assets regarding Internet and email access," including the actions that are prohibited. The employees must be restricted from using the Internet at work for personal use, other than to occasionally check web-based personal email accounts. Personal downloads must be strictly prohibited. Your definition will become part of the overall Richman security policy.

For this assignment: Research Internet use policies on the Internet. Find the actual policies of real companies. Compare the portions that address Internet and email access of at least three different companies. Create an Internet and email use policy for Richman Investments that defines acceptable and unacceptable use of Internet and email access in the workplace.

Respuesta :

Answer:

I researched Sans.org, SHRM, and workable.com and found that companies through their internet policy are concerned about security, confidentiality, and productivity. I studied deeply the internet related policies of the above three organizations and found below point as common:

Internet access is to be used for business purposes only. Capabilities for the following standard Internet services will be provided to users as needed:

Email- The email messages from and to the internet, and with or without document attachment, were allowed for business purposes only, and very little scope for personal emails. And the employees were strictly alarmed not to open any spam messages, or download any such attachment to the organization device. And as far as navigation is concerned, the WWW services were allowed to be accessed for business purposes only, and through the HTTP tools only. And there was limited access from the internet to the companies web server merely, and others have full internet access.

• File Transfer Protocol (FTP) -- Also the use of FTP was allowed for business purposes only.

• Telnet -There was a very strong user authentication necessity for the internet-based contacts inside the company. And the management has the right to delete or add services as per the business requirements and may vary as it changes or warranted by the conditions. And all the other services are declared unauthorized.

And that formulates the internet policy as well.

Explanation:

Please check the attachment.