Ask a question from expert

Ask now

Internet Usage Policy Assignment | BIT-200

7 Pages2581 Words625 Views
   

grand canyon university

   

Internet Usage Policy (BIT-200)

   

Added on  2020-03-04

About This Document

BIT-200 - This report outlines the Internet Usage Policy in depth. This report clearly defines the guidelines for the Internet Usage policy of organizations. It talks about the authorized and prohibited users. This report also gives an effective guideline for usage of Internet in an organization. It also gives a brief outline on the steps and criteria for developing an internet usage policy.

Internet Usage Policy Assignment | BIT-200

   

grand canyon university

   

Internet Usage Policy (BIT-200)

   Added on 2020-03-04

BookmarkShareRelated Documents
Research Report TemplateInternet Usage PolicyStudent NameStudent NumberE-mail AddressABSTRACTThe main focus of this report is to analyze the security vulnerabilities and threats. This report determines the appropriate control measures to minimize or eliminate the security risk. It discusses about the security policy that is used by the organizations in order to protect themselves from any security threats. The policy gives the guidelines, rules and regulations that must be obeyed by the employees for the welfare of the organization. This report covers the Internet Usage Policy of organizations and also sets a guideline for the effective usage of Internet Usage Policy in an organization. Keywords:Internet Usage PolicyBenefits of Internet Usage Policy Guidelines for effective usage of Internet Usage PolicySecurity Policy
Internet Usage Policy Assignment | BIT-200_1
INTRODUCTIONSecurity policies can be defined as set of rules and regulations that is obeyed by organizations inorder to protect the organization from any type of harm. Every organization follows a set of policies that can be used to protect the organization from security issues. An Internet Usage Policy can be defined as a type of control. This policy controls what the employees of an organization can access by using the internet. It also protects the users from any content that would affect the users in a wrong way. This report outlines the Internet Usage Policy in depth. This report clearly defines the guidelines for the Internet Usage policy of organizations. It talks about the authorized and prohibited users. This report also gives an effective guideline for usage of Internet in an organization. LITERATURE REVIEWSecurity PolicySecurity policies are set of norms and regulations that are used for protecting information of an individual, community or a company (Banuri et al. 2012). This policy lays down rules that are to be obeyed by the employees of an organization. Every organization follows different security policies as per their requirements. Violation of these rules and regulations leads to penalty. The security policies are responsible for addressing the constraints on the conduct of the employees of an organization (Alam and Zhang 2012). Security is a crucial factor in the present generation of Internet. Every organization must obey it in order to protect itself from any kind of harm.Internet Usage PolicyIn this era of information and communication technology, every organization needs the access to Internet for running the business. Internet Usage Policy is a set of guidelines that restricts the access of internet for all the employees working in the organization (Bayuk et al. 2012). It makes sure that the internet is used only for the purpose of business purpose. The following services are allowed over the Internet in an organization:Sending files and documents for the use of business via File Transfer Protocol.Send or receive emails.Management has the control of allowing the employees to access certain services and restrict the usage of other services.Need of Internet Usage PolicyIt has been seen that the unmonitored usage of internet in an organization affects the organization in several ways:Productivity: Surfing different websites that are of no use to the business causes loss of productivity (Berger 2014). Employees will get involved in unprofessional activities and harm the business.Virus: Downloading unwanted files and documents affects the system with viruses. This will harm the system resulting in loss of important data.
Internet Usage Policy Assignment | BIT-200_2
Inappropriate content: Surfing inappropriate content over the internet causes serious issues in the work environment. It hampers the ethics of the employees of a company.Transferring unencrypted business data causes serious insecurity to the business. If the sensitive data of a business is lost then it will harm the business in several manners (Cheng et al. 2013). The competitors can gain access to such information and outperformthe company.The above mentioned issues require an organization to use the Internet Usage Policy.PolicyResource Usage: Based on the job description and role of an employee, they will be permitted to use the internet only for the purpose of business (Choyi and Vinokurov 2012). Change of unit of an employee to a non internet usage job will disallow the employee form accessing the internet.Allowed Usage: acceptable use of internet will include certain activities like communicating between employees for the purpose of work, downloading essential software, reviewing vendor websites, finding technical information and to carry out research.Personal Usage: Using the company’s internet for private use will lead to serious troubles that can even cause termination of the employee (Gouflidis, Mayridis and Hu 2014). Users should store their personal data at their own risk. All companies create an audit log that reflects the out-bound and in-bound addresses for the purpose of periodicalreview.Prohibited Usage: Dissemination, storage and acquisition of data that is illegal and inappropriate is prohibited (Ifinedo 2012). The company also prohibits the access to any kind of political related information and fraudulent activities. Employees must be access sensitive information related to the company and misuse it. Software License: Company adheres strictly to the license agreement that is provided by the vendor. Public Information Review: Directories those are publicly writeable are reviewed and also cleared every evening (Neisse, Steri and Baldini 2014). This also prevents the anonymous information exchange. Periodical Review: To be sure about the compliance with all policies, there is a review conducted on a monthly basis (Orr et al. 2012). Reviews are also conducted to check the effectiveness of the usage.Criteria for Internet Usage PolicyThere are certain criteria that must be maintained in order to have a successful Internet usage Policy. The policy must be adaptable to any kind of change in the company (Knaap and Ferrante2012). It must be flexible to meet the goals of the organizations. The policy that is adopted must always be enforceable (Ouedraogo, Bienner and Ghodous 2012). The policy should not be hidden and must help the employees to remember about their activities and also the implications if they break any rule. Steps for developing an Internet Usage Policy
Internet Usage Policy Assignment | BIT-200_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
CIS5205 - Security Policy | Information Security Threats Report
|14
|3431
|70

Managing Information Systems Issues 2022
|3
|394
|13

Advanced Network Security
|6
|1027
|376

Development of Acceptable Use Policy
|6
|1472
|95

Computer Use Policy
|6
|1089
|284

INFORMATION SECURITY POLICY.
|3
|369
|54