Services
March 1, 2020

Workers of the company that is users of the company’s network are guided to follow terms of service and comply with the terms of service and policy of use. It is required that the policy statement is strictly abided by workers and should not be violated in any way (Australia, 2012)

  1. All the users are divided into certain user roles and are granted privileges of access to network resources, depending upon their job specification. In this regard, no user is allowed to share is user role credentials, like username and password, to any other coworker, friend or any other outsider, so that data confidentiality may not get compromised in any way (Attorney General’s Department)
  2. To avoid any inside attack, users are also not allowed to access databases, etc. of their network from device other than provided by the company.
  3. Network Administrators are required to create user roles in such a way that data stays confidential from irrelevant users. They are required to keep their systems protected from physical access of any other user and should apply strict security rules for access control.
  4. For security purposes, all the users are required to change their account passwords every month. In case they fail to do so, their accounts would automatically proceed for a password update request. Users are also required to not use a password that is being used at any of their other online accounts.
  5. In case the user is unable to access its user account, the issue should be instantly forwarded to the network administrator.
  6. Users are not allowed to connect their personal laptops to the internal network and are required to only use the company provided laptops or personal computers for work. This is done in order to avoid falling victim to social engineering attacks.
  7. To avoid any internal attack, users are strictly prohibited to connect any portable device to their laptops. This includes portable hard disks, USBs and CDs, etc.
  8. For keeping network confidentiality, no user is allowed to share any network-related detail to any outsider. This includes information about systems that are being used, network equipment details software types, or any other network related detail. This information should neither be posted in any Blog, social media post, or an interview to outsider. Special permission from higher authority is required in case a media interview is being taken (Attorney General’s Department)
  9. For controlling the spam and malicious activities, most of the irrelevant websites are blocked on network servers. Users are not allowed to access any other irrelevant website from the network resources and are strictly restricted to fill in any online forms or survey through the network device or web service.
  10. Users are required to not install any irrelevant software in their devices that may be a reason for remote access of the device.
  11. Although all the malicious links and websites are already made restricted by the network administrator, yet still users are advised to not search or download any setup, etc. from any website. The required software is already installed in devices and so, there is no need of installing further software without permission of network administrator.
  12. User is advised to immediately inform the network administrator if the user finds any suspicious activity going on in any network domain,

Leave a Reply

Your email address will not be published. Required fields are marked *