You are on page 1of 2

Network Access Policy

Whats this this policy:

A. Purpose of Policy B. Audience C. Standards of Conduct D. Definitions E. Compliance

A.

Purpose of this policy

The purpose of the ACME, Inc. Network Access Policy is to establish the rules and acceptable use of the ACME, Inc.s network resources. These rules are necessary to preserve the confidentiality, integrity, and availability of the information provided by the company.

B.

Audience

The Network Access Policy applies to all individuals who access or have access to network resources. C. Standards of Conduct

Employees are to adhere to the following principles: 1. All network utilization must coincide with job functions and necessary business applications. 2. 3. 4. Only authorized external websites are permitted to be accessed by employees. Employees may not download unauthorized software. Users are not permitted to alter network hardware in any way.

5.

Non-company devices that require network access must conform to the BYOD Policy.

6. Users inside the company firewall may not be connected to the company network at the same time another external network connection exists on their device. 7. Users may not extend or retransmit network services in any way. This includes the addition of routers, switches, hubs, or wireless access points to the company network without prior IS Department approval. 8. Users may not grant access to company network resources to non-authorized personnel.

D.

Definitions

IS Department: The name of the department responsible for the security of information and network resources in the company. BYOD Policy: Bring your own device policy.

E.

Compliance

1. ACME, Inc. technology resources and all information residing on its intranet are assets and property of the company and must be used and treated as such. Therefor each employee is expected to exercise sound judgment to enhance the purpose of this policy. 2. If an employee has any cause to suspect that another employee has engaged in, or is engaging in, any of the activities prohibited in this policy, the matter must be immediately reported to the IS Department or the employees manager. 3. If the company suspects or determines in its sole judgment that an employee is using the companys technology resources that goes against the rules set forth in this policy, the company may immediately terminate or restrict access to any or all of ACME, Inc. technology resources. 4. Violations of this policy may result in disciplinary action, up to and including termination and prosecution under federal, state, or local laws.

You might also like