8 Questions
What is prohibited when it comes to sending emails?
Posting of 'chain letters'
What should be done prior to implementing any connection?
A risk assessment
What must the Third Party comply with?
The Right-Hand's security policies
What should employees do when they state an affiliation to the company?
Make sure to clearly indicate that the opinions expressed are their own
What should employees be aware of when using company resources to access and use the Internet?
That they are representing the company
What must the Right-Hand be able to do?
Monitor and access the Third Party's information
What must be handled in accordance with the ‘Security incident management policy and procedures’?
Incidents originating within the Right-Hand
What type of incidents will require security awareness procedures?
Media loss
Study Notes
-
Employees using company resources to access and use the Internet must be aware that they represent the company.
-
Whenever employees state an affiliation to the company, they must also clearly indicate that "the opinions expressed are my own and not necessarily those of the company".
-
Questions may be addressed to the IT Department.
-
Sending unsolicited email messages, including email spam, is prohibited.
-
Harassment via email, telephone, or paging is prohibited.
-
Unauthorized use, or forging, of email header information is prohibited.
-
The posting of "chain letters", "Ponzi" or other "pyramid" schemes of any type is prohibited.
-
Use of unsolicited email originating from within Right-Hand Cybersecurity's networks of other Internet/Intranet/Extranet service providers is prohibited.
Test your knowledge of the company's internet usage policy with this quiz. From expressing personal opinions to prohibited activities, this quiz covers key guidelines for using company resources.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free