Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Notas de lectura

Computer Security Policy

Puntuación
-
Vendido
-
Páginas
4
Subido en
07-11-2023
Escrito en
2023/2024

It is critical to developing safety measures to establish cyber security. For example, "Google" agrees that computer and email use in the workplace is essential, and employees are advised to use the Internet and email systems wisely, as "Google" and others may be jeopardized by inappropriate use. Regarding the employer/employee relationship, "Google" conforms with all laws. The policy must be implemented following other rules governing proper workplace conduct and behaviour at "Google." Any employee who abuses the company's access to email, computers, or other networks may face disciplinary action, up to and including termination of employment. According to Amankwa at el. (2018), employees can use company machines and data in many ways. For instance, employees who use the company's computer system to get into files, other computer networks, or user names without permission, for example, to be able to stop hacker’s. Things are kept safe by this: Malware, like Trojan horses, viruses, and worms, is found on about 92% of pirated software machines. Employees who steal software and other services from their employers could face fines of up to $150,000 per theft. In order to achieve this, policies like confidentiality and monitoring rules must be put in place to make sure that emails and other electronic texts are treated as company documents and that employees know this. On the other hand, when employees use the company's Internet and email systems to put or send text, audio, video, or image files, they should be held accountable for what they say or do. A person can send an email or use an electronic service that hides the sender's identity or acts as the sender's identity. According to Alias (2019), an internet use policy's goal is to assist people in using the internet, computers, email, and other technology in a beneficial way to them and the people who use them. "Google" in this case. This policy applies to all Google employees, vendors, and others who collaborate with them. Employees agree to follow the values outlined in the procedure by signing this document. Violations of this policy may result in disciplinary and legal action and the termination of a job with the company. "In this instance, "Google." Employees must use the internet and other devices provided by the company to do their jobs and help the company reach its goals while at work for management to deal with this issue. Personal use of the corporate internet while at work is not permitted, but you may use it reasonably a few times per week. According to Koohang at el. (2019), computer security relies heavily on passwords and someone might end up with an insecure password that allows unauthorized access to Google's resources. It is the responsibility of everyone who has access to "Google" systems, including users, contractors, and suppliers, to pick strong passwords and keep them secret. This policy aims to establish a standard for the creation and security of solid passwords and the frequency with which they should be changed. This policy applies to all employees who have or are in charge of an account of some kind. There is access to the "Google" network or some non-public information stored on any device that resides at any "Google" facility that supports or requires a password. All system-level passwords should be shards of a central database-managed global password. All user-level passwords are recommended to be changed at least once every six months.

Mostrar más Leer menos
Institución
CPFO - Certified Public Finance Officer
Grado
CPFO - Certified Public Finance Officer








Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CPFO - Certified Public Finance Officer
Grado
CPFO - Certified Public Finance Officer

Información del documento

Subido en
7 de noviembre de 2023
Número de páginas
4
Escrito en
2023/2024
Tipo
NOTAS DE LECTURA
Profesor(es)
Prof
Contiene
Todas las clases

Temas

4,89 €
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
TutorDenis Griffith University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
10
Miembro desde
3 año
Número de seguidores
8
Documentos
834
Última venta
8 meses hace
Research Portal

Academic and Exam Resources for Business, CPA, Data Science, Nursing, Biology, History, English Literature, and Computer Science Coursework.

4,0

3 reseñas

5
0
4
3
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes