Free Essay

It255 Project 2

In:

Submitted By shizzon72
Words 598
Pages 3
Personal Communication Devices and Voicemail Policy

1.0 Purpose
This document describes Information Security's requirements for Personal Communication Devices and Voicemail for Richmond Investments.

2.0 Scope
This policy applies to any use of Personal Communication Devices and Richmond Investments Voicemail issued by Richmond Investments or used for Richmond Investments’ business.

3.0 Policy
3.1 Issuing Policy
Personal Communication Devices (PCDs) will be issued only to Richmond Investments personnel with duties that require them to be in immediate and frequent contact when they are away from their normal work locations. For the purpose of this policy, PCDs are defined to include handheld wireless devices, cellular telephones and laptop wireless cards. Effective distribution of the various technological devices must be limited to persons for whom the productivity gained is appropriate in relation to the costs incurred.

Handheld wireless devices may be issued, for operational efficiency, to Richmond Investments personnel who need to conduct immediate, critical Richmond Investments business. These individuals generally are at the executive and management level. In addition to verbal contact, it is necessary that they have the capability to review and have documented responses to critical issues.

3.2 Bluetooth
Hands-free enabling devices, such as the Bluetooth, may be issued to authorized Richmond Investments personnel who have received approval. Care must be taken to avoid being recorded when peering Bluetooth adapters, Bluetooth 2.0 Class 1 devices have a range of 330 feet.

3.3 Voicemail
Voicemail boxes may be issued to Richmond Investments personnel who require a method for others to leave messages when they are not available. Voicemail boxes must be protected by a PIN which must never be the same as the last four digits of the telephone number of the voicemail box.

3.4 Loss and Theft
Files containing confidential or sensitive data may not be stored in PCDs unless protected by approved encryption. Confidential or sensitive data shall never be stored on a personal PCD. Charges for repair due to misuse of equipment or misuse of services may be the responsibility of the employee, as determined on a case-by-case basis. The cost of any item beyond the standard authorized equipment is also the responsibility of the employee. Lost or stolen equipment must immediately be reported.

3.5 Personal Use
PCDs and voicemail are issued for Richmond Investments’ business. Personal use should be limited to minimal and incidental use.

3.6 PCD Safety
Conducting telephone calls or utilizing PCDs while driving can be a safety hazard. Drivers should use PCDs while parked or out of the vehicle. If employees must use a PCD while driving, Richmond Investments requires the use of hands-free enabling devices.

4.0 Enforcement
Any employee found to have violated this policy may be subject to disciplinary action that leads to being ineligible for continued use of PCDs. Extreme cases could lead to additional discipline, up to and including termination of employment.

5.0 Definitions
Term Definition
Bluetooth Bluetooth is an industrial specification for wireless personal area networks (PANs), also known as IEEE 802.15.1. Bluetooth provides a way to connect and exchange information between devices such as personal digital assistants (PDAs), and mobile phones via a secure, globally unlicensed short-range radio frequency. Source: Wikipedia

Confidential or sensitive data All data that is not approved for public release shall be considered confidential or sensitive.

6.0 Revision History
Revised on 05/15/2012.
Revision by Shawn Andreas, IT Director, Richmond Investments, Phoenix, AZ branch.

Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
© SANS Institute 2006 All Rights Reserved

Similar Documents

Premium Essay

Project Pt 2 It255

...This is a multi-layered security plan. First, Assign people that are fully trained and/or provide the training that makes it possible to do the job. To prevent malicious software and etc. in the 7 domains of an IT infrastructure, you can isolate and install preventions for each domain. The domains are as follows: User Domain, Workstation Domain, LAN Domain, and LAN to WAN Domain, Remote Access Domain, WAN Domain, and the System/Application Domain. The first part of the IT infrastructure is the User Domain. It is the weakest link in the IT infrastructure and this is where the users connect to the system. You can make the user aware to the risks and threats that they are susceptible to by holding an Awareness Training session. The system is password protected however; you should change passwords every few months to prevent an attack. Also, log the users as they enter and exit the system to make sure there’s no unauthorized access. While it’s the company’s choice to allow employees to bring in USB/Removable drives, you have a threat to someone obtaining the wrong information, or getting malicious software into the system. If you allow the USB/Removable drives, have a virus scan every time someone inserts one into a company computer. In a Workstation Domain, you need to make sure virus protection is set up. You are protecting administrative, workstations, laptops, departmental workstations and servers, network and operating system software. You can enable password protection and...

Words: 683 - Pages: 3

Free Essay

Love

...Matt Carlson IT255.XM1.10WTR Instructor Vincent Tran January 9, 2010 Learner Outcome Project Virtual Lab 1 1. Open the Server Manager console on your Windows Server 2008 computer. What selections are available to you in the left pane? The selections available to me include: Roles, Features, Diagnostics, Configuration, and Storage. 2. Using the Windows Help option, describe any roles and features that are currently installed on this server. There are currently no Roles or Features installed on the server. 3. Explain in your own words why it is a best practice to configure a server, such as a DNS server, with a static IP address rather than allowing it to obtain an IP address using DHCP. To put it simply, if the IP address of the server is consistently being changed by DHCP, then the ports that were opened up to allow the server to work through the firewall are going to be remain opened on the server’s old address, and not necessarily on the new one. This could cause applications to not run properly or at all, but worse, could create security vulnerabilities for the network. A static IP address allows other workstations on the network to easily keep track of the server. 4. Explore the netsh command menus. Record three commands that you can issue from the command line using netsh, and describe what each command does. 1. Exec- runs a script file 2. Add- adds a configuration entry to a list of entries 3. Online- sets the current mode...

Words: 3462 - Pages: 14

Premium Essay

Domain Research Paper

...Kendall Jones IT255 Information System Security Mrs. Scales Feb 29, 2012 Project 2 This policy establishes requirements and guidelines concerning to ensure that only appropriate personal are granted access to sensitive information or system privileges. Systems users are considered to be anyone that has access to assets. Users are expected to comply with LSB policies, standards, and procedures. Users are responsible for familiarizing themselves with any special requirements for accessing, protecting and using data including privacy act requirements copyright requirements and procurement-sensitive data. Users are also responsible for reporting any suspected or actual computer incidents immediately to an appropriate incident response control. Systems administrators are considered to be anyone that has responsibility for maintaining the operation and security posture. Administrators are responsible for ensuring that appropriate access privileges are implemented and enforced. Cryptography is used to protect data that is sensitive has a high value or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Encryption transforms data into cipher text before transmission of storage and decryption transforms the data back into plaintext. Symmetric encryption algorithms operate on blocks of data of fixed size and the same cryptographic key that is used to encrypt the information to be protected is also used to decrypt...

Words: 359 - Pages: 2

Premium Essay

It255

...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems ...

Words: 4296 - Pages: 18

Premium Essay

Student

...Richard Ridgley IT255 LAB 2 Assignment #2 Microsoft Environment Analysis Windows Laptops Back up your Data: It's important that you regularly archive your documents, folders, and settings so that you can retrieve the data if your laptop is stolen or the hard disk fails. How often you should back up your files depends on the number of files you create, how often you create them, and how often you change them. If you create files every day, you might want to back them up weekly or even daily. You can back up your data to a CD or DVD, a USB flash drive, or another computer if your laptop is on a network. It's best to schedule regular, automatic backups that run even while you're working on your laptop. Data Encryption: helps defend against misuse of information if your computer is stolen. Data encryption scrambles the contents of a message or file so that it can be read only by someone who has the appropriate encryption key to unscramble it.You can encrypt a subset of files or folders, or an entire disk. Doing this can help protect the data stored in files and folders, the operating system, and any installed programs. Anti-Theft Device: One of the easiest and most cost-effective ways to help secure your laptop is to use a security cable, with or without an alarm, to attach your laptop to a stationary object. Most laptops have security slots in the side or the back of their case. Use a security cable wherever you leave your laptop...

Words: 608 - Pages: 3