Friday, February 1, 2019

Essay --

COEN 250 Acceptable utilization policyAcceptable Use policyAuthorDate1) Overview (Purpose) HotPot provides its employees computer devices like desktop systems, laptops, and brisk devices such as iPad, communicates to achieve its vision, missions and initiatives. The purpose of this policy is to establish employess refreshing and unacceptable use of the devices and profit resources speckle maintaining its confidentiality, integrity, and availability in fraternity with HotPots established ethical and lawful behavior.2) ScopeThe policy is solely applicable to Information assets belonging to, or leased by, or connect to Hotpots network or reside at its premise. All employees, consultants, contractors, vendors, visitors and customers at HotPot essential follow to this policy.3) Policy Statement3.1 General use and ownership1) In order to maintain reasonable level of privacy and protection, employees should be alert that the data they create on HotPots systems remains the property of the company and confidentiality of the information stored on the sytems is not gurenteed.2) It is employees responsibilities to make decision about personalized use of HotPots resources. It should not affect on individuals productivity. Individual department should provide guidelines regarding personal use of the companys systems. In absence of such policies, employee should take advice from their supervisor or manager.3) It is advisible to users to encrypt any information which seems to be sensitive or vulnerable.4) As per HotPots audit policy for security concerns, HotPots authorized personnels can monitor the companys resources and network traffic at any time and it should be checked on periodic basis in order to ensure compliance with thi... ...- rough of the applications such as Facebook, weather, Twitter, which can be benificial to the company are eitherowed to use, while few applications which involve downloading music, games are not allowed to use during work hours.- Storing adulterous information, storing proprietary information belonging to other company, harrasing or threating others or elaboration in outside business activities are strictly prohibited on your device.Cloud Based services- Cloud based services must comply with HotPots acceptable use policy and strictly follow all laws and regulations related to personal identifiable information, HotPots financial and proproetary information.- Some types of datas may not be stored in cloud. For example, HotPots confidential or proprietary data or communications must not be stored, manipulate or permutation on your personal cloud based service accounts.

No comments:

Post a Comment