Computer Security Policy
It is critical to developing safety measures to establish cyber security. For example, "Google" agrees that computer and email use in the workplace is essential, and employees are advised to use the Internet and email systems wisely, as "Google" and others may be jeopardized by inappropriate use. Regarding the employer/employee relationship, "Google" conforms with all laws. The policy must be implemented following other rules governing proper workplace conduct and behaviour at "Google." Any employee who abuses the company's access to email, computers, or other networks may face disciplinary action, up to and including termination of employment. According to Amankwa at el. (2018), employees can use company machines and data in many ways. For instance, employees who use the company's computer system to get into files, other computer networks, or user names without permission, for example, to be able to stop hacker’s. Things are kept safe by this: Malware, like Trojan horses, viruses, and worms, is found on about 92% of pirated software machines. Employees who steal software and other services from their employers could face fines of up to $150,000 per theft. In order to achieve this, policies like confidentiality and monitoring rules must be put in place to make sure that emails and other electronic texts are treated as company documents and that employees know this. On the other hand, when employees use the company's Internet and email systems to put or send text, audio, video, or image files, they should be held accountable for what they say or do. A person can send an email or use an electronic service that hides the sender's identity or acts as the sender's identity. According to Alias (2019), an internet use policy's goal is to assist people in using the internet, computers, email, and other technology in a beneficial way to them and the people who use them. "Google" in this case. This policy applies to all Google employees, vendors, and others who collaborate with them. Employees agree to follow the values outlined in the procedure by signing this document. Violations of this policy may result in disciplinary and legal action and the termination of a job with the company. "In this instance, "Google." Employees must use the internet and other devices provided by the company to do their jobs and help the company reach its goals while at work for management to deal with this issue. Personal use of the corporate internet while at work is not permitted, but you may use it reasonably a few times per week. According to Koohang at el. (2019), computer security relies heavily on passwords and someone might end up with an insecure password that allows unauthorized access to Google's resources. It is the responsibility of everyone who has access to "Google" systems, including users, contractors, and suppliers, to pick strong passwords and keep them secret. This policy aims to establish a standard for the creation and security of solid passwords and the frequency with which they should be changed. This policy applies to all employees who have or are in charge of an account of some kind. There is access to the "Google" network or some non-public information stored on any device that resides at any "Google" facility that supports or requires a password. All system-level passwords should be shards of a central database-managed global password. All user-level passwords are recommended to be changed at least once every six months.
Written for
- Institution
- CPFO - Certified Public Finance Officer
- Course
- CPFO - Certified Public Finance Officer
Document information
- Uploaded on
- November 7, 2023
- Number of pages
- 4
- Written in
- 2023/2024
- Type
- Class notes
- Professor(s)
- Prof
- Contains
- All classes