Free Essay

Mobile Policy

In:

Submitted By tedolwande
Words 607
Pages 3
Policy for Remote Access
Richman employees, and authorized third parties (customers, vendors, etc.) may, under some circumstances, utilize remote access to access Richman computing resources for which they have been granted access.
Regular, full-time the staff employees that have a valid Domain User Account may request remote access to the th network by completing a Remote Access Request Form. A letter of justification must accompany the request. The letter should address, in sufficient detail, what resources will be accessed and how they cannot be accessed by conventional means.
Guidelines for Access: * Departmental Accounts shall not be granted remote access due to lack of accountability. These accounts are typically shared among several users and there is no way to trace a specific user back to the account at any given time. * Temporary Accounts shall not be granted remote access. * Authorized accounts shall not be granted remote access. * Clerical or Support accounts shall not be granted remote access without prior telecommuting approval (VP endorsement required). * Administrative accounts may be granted remote access. * Vendor Accounts may be granted remote access. Vendor accounts are setup specifically for vendors to access the resources for support purposes. Vendor accounts must be sponsored by an employee. The account sponsor bears responsibility for the account and its use by the vendor. If the vendor account does not already exist, a request to establish one must be made at the same time remote access is requested.
All remote access account holders are subject to the Remote Access Terms of Use.

Operational Procedures
Richman will be implementing two separate remote access solutions: * Microsoft Remote Desktop Gateway (RDG) * Allows you to log in to your computer from off-campus * Requires no software installation * Presents a lower security risk * Does not expire (subject to periodic review) * Cisco AnyConnect (VPN) * Allows you to connect to the th network from off-campus * Requires software installation * Presents a higher security risk * Expires, at minimum, every 12 months
Experience has demonstrated that RDG fulfills the needs of the majority of remote access users.
In order to use remote access, you need a connection to the Internet from your off-campus location. Richman does not provide you with an Internet connection, your Internet Service Provider does. While dialup Internet connections may utilize a remote access connection, performance is very slow and is not recommended or supported. * Remote access users will be automatically disconnected from the network after 30 minutes of inactivity. The user must then logon again to reconnect to the network. Pings or other artificial network processes to keep the connection open are prohibited.
Any user found to have violated the terms of use may be subject to loss of privileges or services and other disciplinary action. 1. It is the responsibility of all employees and authorized third parties with remote access privileges to ensure that unauthorized users are not allowed access to internal networks and associated content. 2. All individuals and machines, including company-owned and personal equipment, are a de facto extension of Richman's network, and as such are subject to the company's Acceptable Use Policy. 3. All computers connected to the internal network via remote access or any other technology must use a properly configured, up-to-date operating system and anti-virus software; this includes all personally-owned computers. Antivirus software may be available for fastaff. 4. Redistribution of the remote access installers or associated installation information is prohibited. 5. All network activity during a remote access session is subject to the company policies. 6. All users of the remote access services shall only utilize resources for which they have been granted permission and rights to use.

Similar Documents

Premium Essay

Mobile Licensing Policy

...3G Mobile Licensing Policy: From GSM To IMT-2000 - A Comparative Analysis TABLE OF CONTENTS: 1 Introduction 6 1.1 The Generations of Mobile Networks 7 2 A Look Back at GSM 10 2.1 GSM Technology 10 2.2 The History of GSM 11 2.2.1 Conference Des Administrations Europeans des Posts et Telecommunications (CEPT) 12 2.2.2 The European Commission and the Memorandum of Understanding 13 2.2.3 European Telecommunications Standards Institute (ETSI) 14 2.2.4 The “Frequency Band” Obstacle Course 14 2.2.5 The Conclusion of the Interstate Bargain 15 2.2.6 The Launch 15 2.2.7 The United States and the FCC 16 2.3 The GSM Market 16 2.3.1 The GSM Success Story 16 2.3.2 Future Market Development 17 2.4 Licensing GSM 18 2.4.1 GSM Radio Spectrum 19 3 A Look Ahead at IMT-2000 19 3.1 From GSM to IMT-2000 19 3.1.1 HSCSD (High-Speed Circuit Switched Data) 22 3.1.2 GPRS (General Packet Radio Service) 22 3.1.3 EDGE, Enhanced Data GSM Environment 23 3.2 IMT-2000 Technology 25 3.3 The History of IMT-2000 25 3.4 Laying the Groundwork for 3G Success 27 3.4.1 Addressing the Need for 3G Spectrum Expansion 27 3.5 The 3G Market 28 3.6 3G Licensing Policies 32 3.6.1 The European Experience 33 3.6.2 The American Experience 35 3.6.3 The Asia-Pacific Experience 37 4 Comparing and Contrasting the Development of GSM and the Road to IMT-2000 37 ...

Words: 30510 - Pages: 123

Premium Essay

Best Ever

...Salix Pharmaceuticals Security Policy Introduction The Salix Pharmaceuticals Security Policy Template is for the use of creating a strong security policy. Each sub policy contains a title with a description and a brief summary of what the certain section will contain. The purpose of the security policies is to ensure that Salix Pharmaceuticals is safe and under strong commands. The Salix Pharmaceutical Security Policy should be reviewed when new materials and changes are to be preceded amongst this company. Scope Salix Pharmaceuticals security policy will keep the company running for years if followed by the procedures. Following the sub policies will lead to a successful company that will be ran smooth and processed like no other company. Antivirus, encryption, passwords, and backups will protect this company like no other before. Purpose Salix purpose for the security template is to have the company, employees, managers, assistant manager, and volunteer’s, and temporary follow all these policies to make the company operate under a easy and fast pace. By making this policy the company should be protected from several things and kept up to date on every policy. Employees should obey this policy and read over every so often in case changes and updates are needed to be added. Acceptable Use Workers must report any signs of violation and a misunderstanding of the policies. Workers are not allowed to access any information they do not have the authority to look...

Words: 1087 - Pages: 5

Free Essay

Is3230 Unit 7 Assignment 1

...Unit 7 Assignment 1 The scalability of the mobile computing in this infrastructure will benefit the school district by being cost effective and the IT technician would not have to monitor/manage many devices in this environment. Reducing the cost of deployment on WLAN implementation, you will want to address many areas of concern: individuals accessing your network, risk of deploying new Software/Configuration, compliant with standards and laws, classification, encryption, security, protocols, and the use of mobile devices. The implementation of access controls in your WLAN will assist in making your environment a little more secure than without. Utilization of the Acceptable Use Policy (AUP), will instruct staff members and students on how to utilize WLAN correctly by law, policies, and standards. Any individual that is not compliant will be subject to disciplinary measures by the school district. Staff members will use access control Role Base Access Control (RBAC), using this control will assign user rights based on the user’s job specification within the school. As for the student body, students will be issued temporary usernames and passwords that will be issued quarterly. Students will have minimum accessibility to files, folders, and services. All accounts are subject to being audited at any given moment notice. There will always be risk involved with any network. Deploying WLAN in a school environment will be a concern with security always. The protection of data...

Words: 499 - Pages: 2

Premium Essay

Vnci

...VNCI Policy Paper # 3 Vietnam Competitiveness Initiative COMPETITION REVIEW OF THE VIETNAMESE TELECOM SECTOR June 2005 This publication was produced for review by the United States Agency for International Development (USAID). It was prepared by Nguyen Thanh Ha and Pham Quang Thanh of Vietbid Technology & Investment Consulting Center and Jacob Gullish of the VNCI with substantive technical input from John Davis of the USAID-funded STAR Vietnam Project. COMPETITION REVIEW OF THE VIETNAMESE TELECOM SECTOR Disclaimer The authors' views expressed in this publication do not necessarily reflect the views of the United States Agency for International Development or the United States Government. ACKNOWLEDGEMENTS This report was prepared by Nguyen Thanh Ha and Pham Quang Thanh of Vietbid and Jacob Gullish of the VNCI, with substantive technical input from John Davis of the USAID-funded STAR project. Following the completion of the first draft of the report, the results were disseminated at a public workshop hosted by the Central Institute for Economic Management on 10 November 2004. Feedback from this workshop was then incorporated into the final report. VNCI would like to thank Huynh Thanh Tung of Saigon Postel, Nguyen Manh Bang of VP Telecom and the other managers of the surveyed firms for their responsiveness to our questions and inquiries. Other acknowledgements include Steve Parker (STAR project) and Fred Burke (Baker and McKenzie) for their input and...

Words: 13120 - Pages: 53

Premium Essay

Byod Pr Cope?

...employees, and since devices are used for personal use, unexpected payments might occur. Thus those data packages may not always completely cover business usage. On the administration side, BYOD may require MDM (Mobile Device Management) services, which are usually provided by a third party, to ensure compliance with organization policy, handle mobile security, and separate between ‘business’ and ‘personal’ usage of the device. MDM services are also required in COPE. Furthermore, IT helpdesk may be inefficient under BYOD policy ; with a wide range of devices used and no standard device policy, help desks may either be less productive due to inability to support devices, or take longer time to complete services due to inexperience with particular apps and/or devices. BYOD approach bears significant security concerns. The primary risk is that personal devices might infect the company network with malware. Additional risk to confidential data comes from lost devices that might provide access to company’s database, without company ability or authority to remotely wipe them out. COPE (Corporate Owned Personally Enabled) strategy on the other hand incurs higher upfront costs on the company, but gives it higher control on the devices and their operation. COPE policy also...

Words: 699 - Pages: 3

Free Essay

Security Polcies

...good work. Professor C Information Security Fundamentals Week 3 Security Policies 08 July 2012 Although the sample email use policy is very generic it does outline specific requirements and rules that must be met. The general restrictions are clear, covering prohibited use. It states that the company email system shall not be used for the creation or distribution of any disruptive, offensive, or discriminatory messages. It addresses prohibited emails and emails that need the VP of Operations approval and the consequences for violating the policy. This email policy does not recognize personal privacy in email, but it allows for a “reasonable amount” of company resources for personal emails. However, this is confusing because it does not define or list the restrictions of personal use. If the business is relatively small than this generalized usage policy would be effective, but for mid to large sized organizations a more in depth email use policy that is part of a larger policy should be developed. In practice, this sample issue-specific policy would not suffice for the majority, but it is a good basic outline. Organizations that have trade secrets to protect, hospitals, government agencies, and financial institutions would need to dissect this particular policy to identify its strengths and alter its weaknesses. A few of its noticeable weak points are: 1. A formal header – The policy identifies the company and a clear title, but it lacks who’s issuing it, if...

Words: 514 - Pages: 3

Free Essay

Why Rural India Is Important?

...Why Rural India is important (for policy makers, business country as a whole)? The word Rural has no specific definition and it depends upon the perceptions of the people. Different people differentiate or mark rural area in accordance to their priorities. It is measured by the parameters leading to underdevelopment or unawareness. It can deal with different sectors and is not specific to any area of work. The Rural area for a policy maker may be one but the same area from the point of view of a businessman might not be underdeveloped. This is the reason, the word ‘Rural’ cannot be defined and it doesn’t hold any concrete definition. When we talk about development it basically deals with the quality of life of the people. Development of a country is measured by the HDI index that takes into account parameters like life expectancy, literacy and the standard of living of its citizens. And in a country with such a large population living below this standard needs to concentrate more on the rural areas to bring about an inclusive growth & development. Rural has become a very important area to be focussed upon because of many reasons. It acts as major source of man power, resources, opportunities etc. There is a large force of underdeveloped people. There is a need to enlighten them and make them aware about different things and then they can be helpful to the country as a whole in many ways. Again, there is abundance of resources available in rural areas. But the proper...

Words: 1125 - Pages: 5

Free Essay

A Walk in the It Director’s Shoes

...security. Most people think that the threat of security attack is only come from outside the company. In fact, the attack from inside the company network is more harmful with high frequency to be happened. It is widely know now that threats from inside the company is far more dangerous than attacks from outside. These facts shows that any company must plan an implement policies to defend their network security from inside and outside intruders. These companies must find how intruders attack in order to protect their information assets. This will help make their network security more effective in blocking threats either from outside or inside the company. Within my paper I will discuss that I am the Information Technology (IT) Director for a small, growing firm and my tasked would be to develop an electronic resource security policy to deploy within my organization. I will discuss the differences between the terms implementation and policy and describe the importance of their separation. Then develop an outline of a security policy which addresses areas that are identified as problems. Then, I will identify the policy differences between users who work remotely or use wireless hotspots compared to users who work on site in a traditional office environment. Finally, I will discuss how I would...

Words: 1183 - Pages: 5

Free Essay

Indian Telecommunication Sector

...Higher standards............making a difference for you INDIAN TELECOMMUNICATION SECTOR I Introduction Indian telecom industry is growing at a great pace & India is expected to become a manufacturing hub for telecom equipment. Indian telecom equipment manufacturing sector is set to become one of the largest sectors globally by 2010. Due to rising demand for a wide range of telecom equipment, particularly in the area of mobile telecommunications, has provided excellent opportunities to domestic and foreign investors in the manufacturing sector. II Opportunitie s The Indian telecom market is expected to grow three fold by 2012 & market size over US $ 8 billion. Moreover the government has set a target of 20 million broadband connections by 2010. The National Telecom Policy 1999 targets tele-density at 15 per cent by 2010. This will entail an investment of US $ 40- 50 billion over the next 6-8 years. There is an immense opportunity for DTH in the Indian market which is almost 10 times compared to the developed countries like the US and Europe. For every channel there is a scope for broadcasting it in at least ten different languages. So every channel multiplied by ten that is the kind of scope for DTH in the country. India’s media players have all the ingredients to develop a successful DTH industry. So currently there is a lot of pent-up demand in the Indian market for DTH. It is expected that by the year 2010 there will be over 500 million subscribers in the Indian telecom market...

Words: 1060 - Pages: 5

Free Essay

Acceptable Use Policy Definition

...Acceptable Use Policy (AUP) Definition After research and careful consideration of some of the other policies listed by other companies such as AT&T, Sprint, T-Mobile, and Verizon Wireless, Richman Investments has come up with the an acceptable use policy (AUP). The following are not allowed at any time: Making of unauthorized promises in e-mail. All emails should have a footer which states that the messages are from the sender only and do not represent the decisions or policies of Richman Investments. Using company resources or web services to visit web sites which contain inappropriate material is prohibited. This includes pornography, sexually oriented material, or sites which promote or depict discrimination, violence, or illegal activities. In addition, it is no longer allowed to have big attachments to multiple recipients in the organization will be enforced. This can tie up the system during a busy point in the day which could end up keeping the company from making profitable decisions. In addition, no jokes or humorous items on Richman Investments email system. These emails may not be considered funny to some, therefore will not be allowed by any. Making statements concerning race, sexual orientation, disability, religion, or national origin are prohibited. These statements could be seen as harassment by either the person receiving it or by other people that may see it. Use of company email to support inappropriate activities is not allowed. Checking a doctor’s...

Words: 324 - Pages: 2

Premium Essay

China Case Analysis

...global business environment. Throughout the reform of political structure and the economic system, the development of China was impressive. However, the potential problems due to the reform also surfaced and became the inevitable challenges of the continuous development of China. The case focuses upon an analysis of the significant challenges faced by China in society and culture, markets, technology and institutions. First, challenges in society and culture. Although China was still a comparatively young country (with a median age of 30), China’s huge population determines some of the inevitable problems during the country development. China was one of the world’s most rapidly aging nations by consequence of the country’s “one child” policy. More elderly dependents than children also cause problems in health care and retirement. The poverty and income were not equal in society. People in China still face the problems of discrimination and corruption. Second, challenges in markets. In product and service markets, local companies were often not pushed to produce high-quality products that would be competitive in the global arena. In factor markets, the size of China’s workforce and the corresponding availability of low-cost workers meanwhile caused the shortage of skilled managers, the substandard of management school, the large number of unemployed migrant workers, and worker rights and workplace protection issues. China’s rapid industrialization and its historic attitude...

Words: 502 - Pages: 3

Free Essay

What a Policy Maker Would Use to Adress the Problem of Poor Sanitation in Lungen Village of Chief Mpezeni's Area

...capacity for sanitation promotion in the country, weak policies and strategies for sanitation promotion, low support for sanitation in donor supported programs, social resistance to the use of the latrines, and lack of multi-sectoral partnerships for sanitation promotion. This paper endeavours to outline and discuss the sequential platform of activities in the policy process which the policy maker would use to address the problem of poor sanitation in Luangeni Village of Chief Mpezeni’s area. The essay also attempts to establish the seriousness of the problem of poor sanitation in the village by presenting statistical evidence. In order to fully comprehend and come up with solutions concerning the topic under discussion it is imperative that we understand some key concepts to be used in this essay, these include policy, policy makers and sanitation. Development policy making lies within the domain of the state. The word policy however has no single defination in literature, this is so because there are different points of view and diverging opinions and definitions from various scholars. Goffrey Vickers (1965) defines policy as decisions that give guidance, coherence and continuity to policy actions for which the decision making body is responsible. Rothblatt (1974:370) defines policy as goal statements specifically adressing the known problems and opportunies associated with a policy area. Nonetheless all these definitions of policy tend to...

Words: 2615 - Pages: 11

Free Essay

Political Participation

...and there had been a rise on the decision making process where citizens get involved. The public participation in the policy process, to truly implement the principles of democracy of the public process should aim to be rational and fair to achieve effectiveness. Public participation relieve doubt that citizen's offerings will affect the policy process. It is of the assumption that a person who will be impinged by a decision, has the right to be associated in decision making. “Wise democratic processes are those which utilize a community's or society's diversity to deepen shared understanding and produce outcomes of long-term benefit to the whole community or society. Not all public participation serves this purpose. Public participation can either enhance or degrade the collective intelligence and wisdom involved in democratic processes such as making collective decisions, solving social problems, and creating shared visions. The principles below offer some guidance for designing wise democratic processes”. Tom Atlee, Co-Intelligence Institute This paper will begin by highlighting aspects of citizen participation showing the advantages and disadvantages it has on the policy process and discuss how citizen participation in the policy making process can be addressed in Jamaica. Some Advantages of public participation Participation in the policy process percusses “the...

Words: 2104 - Pages: 9

Premium Essay

Importance of Security Policies

...Unit 1 Discussion 1 Importance of Security Policies An internet security policy provides employees with rules and guidelines about the appropriate use of company equipment, network and Internet access. Having such a policy in place helps to protect both the business and the employee; the employee will be aware that browsing certain sites or downloading files is prohibited and that the policy must be adhered to or there could be serious repercussions, thus leading to fewer security risks for the business as a result of employee negligence. The Internet Usage Policy is an important document that must be signed by all employees upon starting work. Below is a Sample Internet Usage Policy that covers the main points of contention dealing with Internet and computer usage. The policy can then be tailored to the requirements of the specific organization. External Device use policy regulates access to external storage devices and network resources connected to computers. Device policy helps prevent data loss and leakage and, combined with file scanning, helps guard against security risks. You can configure Device Control policies for internal and external clients. Office-Scan administrators typically configure a stricter policy for external clients. Policies are granular settings in the Office-Scan client tree. You can enforce specific policies to client groups or individual clients. You can also enforce a single policy to all clients. External use device security is becoming an...

Words: 668 - Pages: 3

Free Essay

Wefwefwe Ergw

...opportunities for global and local companies to experiment with approaches and business models, which if successful, may be replicated in rural markets of other emerging economies. India is on the march. Its momentum is not only evident in metros— it is apparent in small towns and villages as well. Collectively, all over India’s rural heartland and in its teeming cities, India is readying for an even more impressive era of economic growth. There is no question that India’s rural markets are becoming a powerful economic engine. One telltale sign: rural accounts now comprise over 50 percent of new subscribers for some of the leading telecom providers.1 The rural multiplier effect is what excites policy makers and business leaders alike. For every new opportunity for a villager to use his mobile phone to protect his crops, there is...

Words: 441 - Pages: 2