logo

Computer and Network Security : Policies in the organization

Exploring the role of a Data Center Manager in managing and operating data centers for Google.

7 Pages1419 Words20 Views
   

Added on  2022-08-25

Computer and Network Security : Policies in the organization

Exploring the role of a Data Center Manager in managing and operating data centers for Google.

   Added on 2022-08-25

ShareRelated Documents
Running head: COMPUTER AND NETWORK SECURITY
COMPUTER AND NETWORK SECURITY
Name of the Student
Name of the University
Author Note
Computer and Network Security : Policies in the organization_1
1COMPUTER AND NETWORK SECURITY
Introduction
In an organization, policies are very important, as it will help the employees to work
with ethics and with decorum within the office or the organization. The policies are essential
as they address the issues those are relevant. Using both processes and policies during the
making of decisions make sure that the employees are reliable in their decisions. The policies
of the workplace establish several guidelines, boundaries and the best practices for the
behaviour those are acceptable at the work place. The aim of these policies allows
communication among the employees so that good behaviour is expected from the
employees.
Office Suite Access Policy
The Office Suite Access Policy is the policy that is maintained during entering of the
office (Lyons et al 2016). The policy includes a security guard outside the office that will
greet the employees of the company when they enter the office.
The hours of work for the security guards should be from opening hours of the office until
the office is closed.
If the office accommodates night shift, then the security guards should have shifting duty
that is during the night shift, one security guard will come and another will go.
An employee can only access the office outside the business hours only he or she has
urgent work or urgent submission of assignments. If it is not maintained, then or she will
be subjected to questions by the higher authority of the business.
The office should have various types of technologies in order to protect the office suite so
that if any kind of mishap happens then actions can be taken (Cram, Proudfoot and
D’Arcy 2017). The technologies should be CCTV camers. The CCTV cameras will be in
the supervision of the higher authorities and they will keep an eye on everyone.
Computer and Network Security : Policies in the organization_2
2COMPUTER AND NETWORK SECURITY
There will limitations on access hours to the office. The employees can only access the
office after the office hours if and only if they have urgent work or any submission of
assignments.
Data Centre Access Policy
The Data Centre Access policies are as follows:
There will be certain policies in order to access the data centre (Weng et al 2018). There
will be certain people like the higher authorities and the expert of handling the data
centres will be allowed to access the data centers.
The access will be allowed at certain time during the office hours like in between the
office hours to check if the data centres are working well or not.
The access is not limited to the business hours and if an emergency happens, it will be
mitigated right away, as the data centres are important for the office. An IT expert will
only do the mitigation of the emergency in the data centres.
The data centres of the office will be secured by card readers and the card readers will be
available to the IT expert and the higher authority of the office.
The cameras will also be installed in the data centres and the person in charge of the Data
centres will monitor it (e Silva et al 2018).
The equipments of the cabinets will be secured by lock and key and it will be in-charge of
the person in charge of the data centre room.
The vendors will have the access to the data centre but the IT experts of the company will
assist them. The CCTV cameras installed in the room will also monitor them.
Information Technology Closet Access Policy
The Information Technology Closet Access Policy for the business is as follows:
Computer and Network Security : Policies in the organization_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Guidelines and Procedures for Physical Controls and Processes
|4
|1203
|416

The Importance of Network Security and the Implementation of Security Measures
|17
|6330
|26

Should the Use of Social Media During Office Hours be allowed Case Study 2022
|9
|1398
|33

Implementation of BYOD
|6
|1168
|252

Hardware and Networks for MATTAC
|8
|2064
|248

Computer Use Policy
|6
|1089
|284