Here's a concise summary of the network usage policy:
Policy Overview:
This policy guides users on best practices for internal and external network usage, ensuring data and network protection from cyber threats and optimal performance.
Best Practices (Acceptable Use):
- Work Purposes Only: Use networks for professional activities.
- Secure External Access: Use secure networks and avoid unprotected public networks.
- Sensitive Data Access: Use secured accounts and MFA.
- Regular Updates: Update hardware and software.
- Data Transfer Policies: Adhere to data transfer policies and use encryption.
- Incident Reporting: Report suspicious activity or breaches.
Prohibited Practices (Unacceptable Use):
- Illegal/Recreational Activities: Do not use the network for non-work-related activities.
- Untrusted Networks: Do not connect to unprotected networks.
- Unlicensed Software: Do not download unlicensed software.
- Unauthorized Data Sharing: Do not share sensitive data without security measures.
Corrective Procedures:
- Initial Warning: Warning for policy violations.
- Network Access Suspension: Temporary suspension for repeated violations.
- Mandatory Training: Cybersecurity and network usage training.
- Disciplinary Measures: Dismissal or legal action for serious violations.
Network Usage Examples:
- Correct: Secure connection, encrypted file transfer, controlled access.
- Incorrect: Unsecured network connection, unlicensed software download, leading to suspension and training.
Conclusion:
Adhering to network usage policies ensures data security and performance. Violations result in penalties, with emphasis on training and awareness.