Report on Acceptable Usage Policy in System Administration Context

Verified

Added on  2020/10/22

|7
|867
|234
Report
AI Summary
This report provides an overview of an Acceptable Usage Policy within a system administration context. It details the policy's objectives, which include protecting information systems, minimizing potential damage, and defining individual responsibilities for IT and information security. The purpose of the policy is to ensure the safety and security of IT equipment. The report outlines the policy's scope, covering employees, vendors, and others connected to IT systems, as well as remote and on-campus access. Key elements discussed include internet and email usage, hardware security, and group policies such as access control panel restrictions, command prompt control, disabling of media drives, and software installation restrictions. The report also includes references to relevant literature and online resources.
Document Page
System administration
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Overview..........................................................................................................................................3
Objective-.........................................................................................................................................3
Purpose- ..........................................................................................................................................3
Policy -.............................................................................................................................................3
Scope - ............................................................................................................................................4
IT equipment and information access policy- .................................................................................4
REFERENCES................................................................................................................................5
Document Page
Overview
The acceptable usage policy is covered the security aspects and usage in the terms of
information and IT equipment. It can be included the internet, mobile IT equipment and email
etc. This policy is applied on the organization to their employees, agents, investors and
contractors. Each and every individual person has more responsibility to control the hardware
access in the organization (Dodgson, 2018). All the user has user id and password to operate own
account in proper manner.
Objective
The objectives of acceptable policy are:
It has provided the consistent and rigorous protection to information system and also help
for managed in both ways such as business policy and legal requirements.
It is minimized the potential damage to the organization and IT information or equipment
being exposed (Koliba and et.al., 2018).
It has responsibilities for individual for protecting IT and information effectively and
efficiently.
Purpose
The main purpose of acceptable policy that help for providing the safety and security
regarding IT equipment in the organization.
Policy
Acceptable policy is designed for reducing the risk of unauthorized access and data loss.
Hardware system must be locked and also protected with the screen locking that help for
controlled by using password (Huang and et.al., 2018). All enterprises regarding printed matter
always disposed with the help of confidential waste bins. Every employee has used the software
to access the data by using the licensing agreement software. It is used the policy when the
employees are working away from the office.
Document Page
Scope
This policy has been applied in the organization, employee, vendor and other people
those who connect with IT equipment and system by using hardware devices, whether own by
the company (Shafritz, 2018). This policy is applied in both ways such as on remote access
connection and on campus that help for interacting with the firm. This policy is covers technical
implementation of remote access and local used to connect with the network.
IT equipment and information access policy
Internet and email are required for business process that provide the facility to share the
information from one place to another but it is needed for enterprise to use the acceptable policy
for protecting their IT equipment (Madon and Krishna, 2018). The hardware system contains the
personal information that may not be shared to any people at time. The organization is provided
the temporary access to check the details with the approval of system administrator. All the
people are accountable for performing different action on the internet and email system.
Usage of email and internet for the purpose of harassment so that this acceptable policy
provide the user name and password to protect their IT system.
Leave their password unprotected (Acceptable policy, 2018).
It cannot be connected to any non-authorized devices to the network system.
The proper authenticated data is transferred from one device to another in the
organization.
Technology must conform the password policy and other security needs articulated by
office information services.
Attempting and accessing to restrict the data and file, system or software without any
authorization.
Group policy
Access to control panel – It is a policy in which user are having access to operate control
panel. The admin sets restriction over control panel. This helps in keeping data protected.
Control access to command prompt- Here, admin disable user to run high level
commands on system. This is done by disabling command prompt from by making
changes in group policy.
Disable media drives- In order to prevent system from virus attack, admin disable plug
in of media drivers into system. It is done by editing group policy.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Restricting software installation – It is a group policy that restrict user to install
different types of software into system.
Document Page
REFERENCES
Books and Journals
Dodgson, M., 2018. Technological collaboration in industry: strategy, policy and
internationalization in innovation. Routledge.
Huang, Y and et.al., 2018. A technology delivery system for characterizing the supply side of
technology emergence: Illustrated for Big Data & Analytics. Technological Forecasting
and Social Change. 130. pp.165-176.
Koliba, C.J. and et.al., 2018. Governance networks in public administration and public policy.
Routledge.
Madon, S. and Krishna, S., 2018. The Digital Challenge: Information Technology in the
Development Context: Information Technology in the Development Context. Routledge.
Shafritz, J., 2018. The dictionary of public policy and administration. Routledge.
Online:
Acceptable policy 2018. [online] Available
through:<https://www.getsafeonline.org/themes/site_themes/getsafeonline/download_centre/
sample_acceptable_usage_policy.pdf>
Document Page
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]