StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Week 2 1.2 Submission - Assignment Example

Cite this document
Summary
It has recently come to the attention of our Information Technology Department that there have been a number of hacking attempts upon our server over the past three months. Although our firewalls have been successful in thwarting the attempted security breaches, we would like to…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
Week 2 Assignment 1.2 Submission
Read Text Preview

Extract of sample "Week 2 1.2 Submission"

ACT Center Employees CC: hrd.@act.com BCC: Acceptable Usage of Employee Email and Messaging Services Attachment: To Our Valued Employees: It has recently come to the attention of our Information Technology Department that there have been a number of hacking attempts upon our server over the past three months. Although our firewalls have been successful in thwarting the attempted security breaches, we would like to remind everyone of our company employee email and messaging services policy. This reminder is being sent out to all employees because our highly capable IT Security Department noted that the attempts to break into our servers coincided with high email traffic from within our system to outside email accounts.

Our security team suggested that there might be a direct link between the two events. So it behooves us to remind our employees of their responsibilities pertaining to the secure use of the company email and messaging systems. In order to ensure the continued security of our company servers, please take note of the following while using our company email and messaging services: Email Privacy Policy: Any employees of this company can have NO expectation of privacy concerning email, phone, IM, Text messaging, web browsing or data  when using company resources.

These resources include but are not limited to: Company emailCompany internet connectionCompany computersCompany phone servicesCompany data networkCompany serverCompany premisesAcceptable uses of Company Email and Messaging Systems The company provides internet and email access solely for business purposes. We encourage the use of email and instant messaging in order to help facilitate the speedy communication between departments and branches. The company provides these technological services in an effort to represent our company in the most productive manner possible to our clients.

However, we discourage the use of email and instant messaging for personal reasons using company equipment. Such types of use exposes our company servers and clients to electronic problems such as identity theft and hacking. Therefore, it is the responsibility of every employee to ensure our server security by responsibly using the email and messaging system of the company. Any improper use of the Internet or e-mail is not acceptable and will not be permitted. Unacceptable Use of Company Email and Instant Messaging The company e-mail and Internet access may not be used for transmitting, retrieving or storage of any communications of a discriminatory or harassing nature or materials that are obscene or X-rated.

Harassment of any kind is prohibited. No messages with derogatory or inflammatory remarks about an individuals race, age, disability, religion, national origin, physical attributes or sexual preference shall be transmitted. No abusive, profane or offensive language is to be transmitted through the companys e-mail or Internet system.Electronic media may also not be used for any other purpose that is illegal or against company policy or contrary to the companys best interest.Solicitation of non-company business or any use of the company e-mail or Internet for personal gain is prohibited.

Any deviation by an employee from the aforementioned guidelines for the proper use of company email and instant messaging shall result in the immediate termination of employment and the possible cancellation of his separation and/or retirement benefits. Please be guided accordingly. You may contact us at hrd@act.com regarding any questions or clarifications you might have. Sincerely,Jane ReeseDirectorEmployee RelationsHRD - ACT CenterSourceDavis, J. (2001). The big three rules of e-mail etiquette.

The Tech Republic CIO50. Retrieved from http://www.techrepublic.com/article/the-big-three-rules-of-e-mail- etiquette/1033827N.A. (2008). Sample corporate policy guideline internet and email acceptable user policy. Sonora Communications. Retrieved from http://www.sonoracomm.com/support/19-inet-support/61-sample-aup

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Week 2 Assignment 1.2 Submission Example | Topics and Well Written Essays - 500 words”, n.d.)
Week 2 Assignment 1.2 Submission Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/english/1612760-week-2-assignment-12-submission
(Week 2 Assignment 1.2 Submission Example | Topics and Well Written Essays - 500 Words)
Week 2 Assignment 1.2 Submission Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/english/1612760-week-2-assignment-12-submission.
“Week 2 Assignment 1.2 Submission Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/english/1612760-week-2-assignment-12-submission.
  • Cited: 0 times

CHECK THESE SAMPLES OF Week 2 Assignment 1.2 Submission

Week 6 Case Study 2 Submission

With the current trends in technology, there is the emergence of complex systems, automated business transactions, and e-commerce applications that need the installation of complex and rigorous security measures.... Public key cryptography is a security technology that is known for… For the Software Company to achieve this security assurance there must be careful planning for the infrastructure....
2 Pages (500 words) Assignment

Are Women Culturally Different than Men

In the paper “Are Women Culturally Different than Men?... rdquo; the author discusses cultural differences between men and women, in the same society.... Men and women learned their roles through what society prescribed to them instead of allowing individuals in either gender to describe their own roles....
5 Pages (1250 words) Assignment

Week 2 CYB632

Attackers may obtain sensitive information from the networks and may cause the network to be corrupted.... One example of such attacks is IP… In this type of attack, the attacker replaces the original IP address with a different address from another machine (Liska, 2003).... The attacker can then masquerade as a trusted host thereby gaining access to a network....
2 Pages (500 words) Assignment

WEEK 2 DQ 1

The idea of Emotional Intelligence (EI) is as a result of far-reaching research in the aspects of interpersonal behavior, problem solving and intrapersonal relationships.... The idea basically entails the existence of a mental or cognitive skill capable of rationalizing (instead of… Because of this rationalizing, a person builds a strong capacity to improve thought....
1 Pages (250 words) Assignment

Week 2 705

The bundle consists of inclination of a patient's head, pausing sedation everyday to week 2 705 May 11, week 2 705 EBP bundles Evidence-Based Practice (EBP) bundles define a collection of evidence-based measures, which forms a single quality indicator, for managing a health condition....
1 Pages (250 words) Assignment

Structure, Materials and Fire in Construction

… The paper “Structure, Materials and Fire in Construction, Effects of Fire on Steel Framed Buildings”  is a forceful version of assignment on engineering and construction.... Concrete frame construction is widely used by Construction Industries across the world.... Concrete is a mixture of sand, cement with water and it can be mold into different shapes....
9 Pages (2250 words) Assignment

External Fire Spread between Buildings and Determination of Unprotected Areas

… IntroductionThe aim of this project is to guide the users concerning the fire safety tragedy of an academic building with a capacity of six thousand people.... This will undoubtedly help them to apply in real life situation and escape safely in case of IntroductionThe aim of this project is to guide the users concerning the fire safety tragedy of an academic building with a capacity of six thousand people....
15 Pages (3750 words) Assignment

Mystery Shopping

1 2 3 4 5 3.... 1 2 3 4 5 4.... 1 2 3 4 5 5.... 1 2 3 4 2.... 1 2 3 4 5 3.... 1 2 3 4 5 4.... 1 2 3 4 5 5.... 1 2 3 4 5 6.... 1 2 3 4 5 7.... 1 2 3 4 5 8.... 1 2 3 4 5 9.... 1 2 3 4 5 Findings and analysisAldiAsdaBudgens1....
5 Pages (1250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us