Professional Documents
Culture Documents
I. Overview:
The purpose of this policy is to allow the comprehension of the acceptable and unacceptable uses of network devices and resources, both mobile and not mobile, at The Alpha Android Company in concurrence with its established atmosphere of ethical and lawful behavior, openness, trust, and integrity. The Alpha Android Company supplies desktops, laptops, networks, tablets, mobile phones, and other electronic devices and systems to meet any and all goals, deadlines, and initiatives and must manage them responsibly to maintain the security, integrity, and openness of its informational assets. This policy states that the users of information assets comply with company policies and protect the company against any and all damaging legal issues in any way possible.
II. Scope:
All employees, recruiters, and other workers (part-time and temporary included) at The Alpha Android Company, including third party affiliated personnel must adhere to this policy. This policy applies to information assets owned or leased by The Alpha Android Internet
Provider Company, or to devices of any kind that establish a connection with an Alpha Android network or on the Alpha Android website. Information Security must allow exceptions to this policy at least 10 days prior to use of exception by requesting an exception by e-mail, exception request form, or in person.
3.3.2: All Personal Computers, Personal Digital Assistants, Laptops, mobile devices, and workstations must be secured with a password protected screensaver with the automatic activation feature set to 5 minutes or less. You must lock the screen or log off when the device is unattended (if on lunch break, lock the device). 3.3.3 Devices that connect to The Alpha Android network must follow the Minimum Access Policy. 3.3.4 Do not attempt to disrupt, interfere with, or turn off the corporate device management, security systems, or any company software, including, but not limited to, antivirus, Windows Firewall, Ironclad, McAfee, and BlackBerry Enterprise Service.
3.4.4: Breaking Copyright law, including, but not limited to, illegally duplicating or transmitting copyrighted pictures, music, video, or software. See the page http://www.copyright.gov/title17/. 3.4.5: Exporting or importing software, technical information, encryption (data hiding) software, or technology in violation of international or regional export control laws. See http://www.bis.doc.gov/index.php/regulations#ear 3.4.6: Use of the Internet or The Alpha Android Company network or any other networks that violate the Internet Security Policy, other Alpha Android Company policies, or local laws. 3.4.7: Intentionally entering, introducing, or activating malicious code to/on The Alpha Android Company networks, including, but not limited to, viruses, worms, Trojan Horses, e-mail bombs, spyware, adware, and keyloggers. 3.4.8: Port Scanning or Security scanning on a production network unless authorized in advance by the Information Security Department.
3.5.3: Forging, misrepresenting, obscuring, suppressing, replacing, or use any other form of disinformation to mislead the recipient about the sender 3.5.4: Committing newsgroup spam 3.5.5: Use of an Alpha Android Company e-mail, IP address, or network to engage in conduct that violates Alpha Android Company policies, guidelines, or any local laws. Posting to a public or private discussion, chat room, or LISTSERV with an Alpha Android Company e-mail, IP address, or network representing The Alpha Android Company to the public; therefore, you are entitled to exercise good judgment to avoid misrepresenting/exceeding your authority in representing the opinion of the company.
IV. References
http://www.bis.doc.gov/index.php/regulations#ear http://www.copyright.gov/title17/
V. Enforcement
An employee found to have violated this policy may be subject to penalizing/disciplinary action up to and including the firing of said offender. A violation of this policy by a temporary worker, contractor, or vendor may result in the termination of said workers, contractors, or vendors contract/assignment with The Alpha Android Company.
VI. Definitions
Honeypot/Honeynet Network decoys that serve to distract attackers from valuable machines on a network. The decoys provide an early warning for intrusion protection and detailed information on vulnerabilities. Electronic junk mail or junk newsgroup postings. Messages that are unsolicited, unwanted, and/or irrelevant Personal Digital Assistant; an electronic device that stores and organizes information. Also known as Keystroke Logging, it is the action of recording the keys struck on a keyboard. Posting the same/similar nonbusiness-related messages to large numbers of Usenet Newsgroups A software program that transparently copies an e-mail and sends one of the copies per address to every address. a repository usually within the Usenet system, for messages posted from many users in different locations. Other names are: discussion group, forum, chat room, and social media website
Spam
PDA
Keyloggers
Newsgroup Spam
LISTSERV
Usenet Newsgroup