Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
College aantekeningen

Computer Security Policy

Beoordeling
-
Verkocht
-
Pagina's
4
Geüpload op
07-11-2023
Geschreven in
2023/2024

It is critical to developing safety measures to establish cyber security. For example, "Google" agrees that computer and email use in the workplace is essential, and employees are advised to use the Internet and email systems wisely, as "Google" and others may be jeopardized by inappropriate use. Regarding the employer/employee relationship, "Google" conforms with all laws. The policy must be implemented following other rules governing proper workplace conduct and behaviour at "Google." Any employee who abuses the company's access to email, computers, or other networks may face disciplinary action, up to and including termination of employment. According to Amankwa at el. (2018), employees can use company machines and data in many ways. For instance, employees who use the company's computer system to get into files, other computer networks, or user names without permission, for example, to be able to stop hacker’s. Things are kept safe by this: Malware, like Trojan horses, viruses, and worms, is found on about 92% of pirated software machines. Employees who steal software and other services from their employers could face fines of up to $150,000 per theft. In order to achieve this, policies like confidentiality and monitoring rules must be put in place to make sure that emails and other electronic texts are treated as company documents and that employees know this. On the other hand, when employees use the company's Internet and email systems to put or send text, audio, video, or image files, they should be held accountable for what they say or do. A person can send an email or use an electronic service that hides the sender's identity or acts as the sender's identity. According to Alias (2019), an internet use policy's goal is to assist people in using the internet, computers, email, and other technology in a beneficial way to them and the people who use them. "Google" in this case. This policy applies to all Google employees, vendors, and others who collaborate with them. Employees agree to follow the values outlined in the procedure by signing this document. Violations of this policy may result in disciplinary and legal action and the termination of a job with the company. "In this instance, "Google." Employees must use the internet and other devices provided by the company to do their jobs and help the company reach its goals while at work for management to deal with this issue. Personal use of the corporate internet while at work is not permitted, but you may use it reasonably a few times per week. According to Koohang at el. (2019), computer security relies heavily on passwords and someone might end up with an insecure password that allows unauthorized access to Google's resources. It is the responsibility of everyone who has access to "Google" systems, including users, contractors, and suppliers, to pick strong passwords and keep them secret. This policy aims to establish a standard for the creation and security of solid passwords and the frequency with which they should be changed. This policy applies to all employees who have or are in charge of an account of some kind. There is access to the "Google" network or some non-public information stored on any device that resides at any "Google" facility that supports or requires a password. All system-level passwords should be shards of a central database-managed global password. All user-level passwords are recommended to be changed at least once every six months.

Meer zien Lees minder
Instelling
CPFO - Certified Public Finance Officer
Vak
CPFO - Certified Public Finance Officer








Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CPFO - Certified Public Finance Officer
Vak
CPFO - Certified Public Finance Officer

Documentinformatie

Geüpload op
7 november 2023
Aantal pagina's
4
Geschreven in
2023/2024
Type
College aantekeningen
Docent(en)
Prof
Bevat
Alle colleges

Onderwerpen

€4,91
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kan je een ander document kiezen. Je kan het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
TutorDenis Griffith University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
10
Lid sinds
3 jaar
Aantal volgers
8
Documenten
834
Laatst verkocht
8 maanden geleden
Research Portal

Academic and Exam Resources for Business, CPA, Data Science, Nursing, Biology, History, English Literature, and Computer Science Coursework.

4,0

3 beoordelingen

5
0
4
3
3
0
2
0
1
0

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen