You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company. There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company. You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company. Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable). 1. Overview 2. Purpose 3. Scope 4. Policy 5. Policy Compliance 6. Related Standards, Policies and Processes 7. Definitions and Terms Purchase the answer to view it

Email Policy:

1. Overview:
This policy outlines the guidelines and restrictions for the use of company email resources by employees. It aims to ensure that email is used responsibly, efficiently, and in a manner that protects the company’s interests and information.

2. Purpose:
The purpose of this policy is to define acceptable use of company email resources, clarify employee responsibilities, and establish protocols for maintaining email security, confidentiality, and integrity.

3. Scope:
This policy applies to all employees, contractors, and third-party individuals who have access to the company’s email system. It covers all email communications sent or received using company email accounts or devices.

4. Policy:
a. Personal Use: Company email resources are primarily intended for business purposes. Limited personal use is permitted, but it should not interfere with work productivity or violate any other policies of the company. Personal emails should not be discriminatory, offensive, or in violation of applicable laws.

b. Confidentiality: Employees are responsible for maintaining the confidentiality of company information transmitted via email. This includes not disclosing sensitive or proprietary information to unauthorized individuals or entities.

c. Misuse of Email: Any misuse of email resources, such as sending spam, chain letters, viruses, or engaging in unauthorized activities, is strictly prohibited. Employees should not use email for illegal or unethical purposes.

d. Security: Employees must take reasonable measures to protect their email accounts from unauthorized access. This includes using strong passwords, not sharing login credentials, and promptly reporting any suspected security breaches to the IT department.

e. Monitoring: The company reserves the right to monitor email communications for security, compliance, or other legitimate business purposes. Employees should not have an expectation of privacy when using company email resources.

5. Policy Compliance:
Failure to comply with this policy may result in disciplinary action, up to and including termination of employment. Employees should familiarize themselves with this policy and seek clarification from the IT department if they have any questions.

6. Related Standards, Policies, and Processes:
This policy should be read in conjunction with other relevant company policies, such as the Acceptable Use Policy and the Information Security Policy. Additionally, employees should adhere to any applicable laws and regulations governing email communications.

7. Definitions and Terms:
a. Company email resources: Any email accounts, systems, software, or devices provided or authorized by the company for business use.

b. Personal use: Limited and occasional use of company email resources for non-work-related purposes.

c. Misuse: Any unauthorized or inappropriate use of company email resources, including but not limited to violations of applicable laws, regulations, or company policies.

WIFI and Internet Use Policy:
1. Overview:
This policy defines the guidelines and restrictions for WIFI and Internet use within the company. It aims to ensure that WIFI and Internet resources are used securely, responsibly, and in a manner that aligns with the company’s mission and values.

2. Purpose:
The purpose of this policy is to establish clear rules and responsibilities for WIFI and Internet use, protect company information and systems from unauthorized access, and promote a safe and productive work environment.

3. Scope:
This policy applies to all employees, contractors, and visitors who have access to the company’s WIFI and Internet resources. It covers both wired and wireless connections, including personal devices used on company premises.

4. Policy:
a. Acceptable Use: WIFI and Internet resources provided by the company should only be used for business-related purposes. Limited personal use is allowed, but it should not interfere with work productivity or violate any company policies.

b. Security: Employees must take reasonable measures to protect the company’s WIFI and Internet resources from unauthorized access. This includes using strong passwords, not sharing login credentials, and promptly reporting any suspected security breaches to the IT department.

c. Prohibited Activities: Employees are prohibited from engaging in activities that may compromise the security, integrity, or efficiency of the company’s WIFI and Internet resources. This includes accessing or distributing illegal or offensive content, downloading unauthorized software, or engaging in hacking or unauthorized network scanning.

d. Data Privacy: Employees should respect the privacy of others when using WIFI and Internet resources. They should not access, modify, disclose, or distribute personal or confidential information without proper authorization.

e. Monitoring: The company reserves the right to monitor WIFI and Internet usage for security, compliance, or other legitimate business purposes. Employees should not have an expectation of privacy when using company WIFI and Internet resources.

5. Policy Compliance:
Failure to comply with this policy may result in disciplinary action, up to and including termination of employment. Employees should familiarize themselves with this policy and seek clarification from the IT department if they have any questions.

6. Related Standards, Policies, and Processes:
This policy should be read in conjunction with other relevant company policies, such as the Acceptable Use Policy, Information Security Policy, and Remote Access Policy. Additionally, employees should adhere to any applicable laws and regulations governing WIFI and Internet use.

7. Definitions and Terms:
a. WIFI and Internet resources: Any network connections, devices, or services provided or authorized by the company for WIFI and Internet access.

b. Acceptable use: The authorized and appropriate use of company WIFI and Internet resources in accordance with this policy and other relevant policies.

c. Prohibited activities: Unauthorized or inappropriate activities that are in violation of this policy or applicable laws, regulations, or company policies.

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer