This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Art

Internet and computer security policies for Walmart

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Internet and computer security policies for Walmart

Introduction

The security of the organization’s roles lies with the Chief Security Officer. Over the past few years, research has consistently shown that malwares and viruses gain access to the organization’s security systems through emails and internet use. Emails that come from unknown senders are mostly used for these purposes. This paper will discuss computer besides email acceptable use policies as well as Internet fair use policies for Walmart company.

Computer and email acceptable use policy

Walmart takes much consideration of how employees use emails within the company system. The plans are aimed at maintaining better security measures (Robson & Pitt, 2018). Due to this the organization has put in place acceptable computer and email user policies;

All personal messages coming through the company computers are treated similarly to any other word in the system. Therefore, they cannot be archived continuously because they can be retrieved even after deletion by the user.

Users are required to acknowledge that all emails besides internet visits reflect the name of the organization (Rusk, 2001). Therefore, accuracy and appropriacy should be ensured to protect the company from possible liabilities..

Don't use plagiarised sources.Get your custom essay just from $11/page

All company staff must ensure they keep and protect their passwords used in emails from any other person. The IS department will retain all abilities to maintain employee passwords for various reasons, which may include resetting of the passwords if forgotten to check email accounts are required or deletion of email servers.

Company computer cannot be used for accessing or obtaining or downloading any materials which may be deemed insulting, disrupting or offensive by other people or be harmful (Rusk, 2001). The item for this class may include graphics that are considered harassment if not disparaging in regards to sex, race or sexual orientation.

Bounced mails

If any company employee receives a bounced email which the MIS forward to them, especially if the message comes from you have regular communication, the employee is required to write the sender and alert them of the email address. This rule applies to all email mistakes (Robson & Pitt, 2018).

Attachments

Receiving

Any email coming from an unknown sender should be immediately be deleted without reading. If the attachment is suspicious, alert the CIO. This is because of viruses spread through email attachments, which seem legitimate ((Robson & Pitt, 2018).

All emails coming from unknown senders should be scanned for possible viruses before opening. No user is allowed to disable automatic scanners, and if the user realizes that the scanners are working, notify the CIO.

Sending

All attachments should be a maximum of 1.5m. Attachments with storage requirements above the limit may result in the crashing of the email client leading to server issues.

In case a user wishes to send a file larger than the required size, he/she should inform the IS department before sending the data. This will enable the department to split the email into various parts, which will allow the sending of the email (Robson & Pitt, 2018). Upon finishing the sending process, delete the emails to avoid extra space consumption.

Storage, filing and maintenance

In case the user receives and reads an email, and they want to store it, use the appropriate folder within the Quick-mail.

Internet acceptable use policy

Walmart is compliant with internet use policies, which enable the company to evade liabilities and help users protect the company systems from external infiltration and security threats (Robson & Pitt, 2018). The company has put in place Internet Acceptable User policies which will help the company protect its internet use;

Disclaimer liabilities of using internet

Walmart will not be responsible for any content viewed or downloaded by company employees from the web (Siau, Nah & Teng, 2002).

Users have the duty not to waste computer resource

Users are prohibited from deliberately performing actions that result in wastage of computer resources or limits the use of the computer by others in the company. The activities may involve but limited to mass email or chain letter sending, heavy periods on the internet, games, online chatting, printing many different document copies and also the creation of network traffic.

No privacy expectations

All counts allocated to users are only meant to facilitate their working and completion of their tasks. No user should expect privacy when creating, storing, sending or receiving anything through the system (Robson & Pitt, 2018). All computers belong to Walmart and must not be used for personal benefits.

Monitoring computer usage

Walmart retains the right and not the duty to monitor any as well as all activities within the network. This may include monitoring of user visit sites, chat groups, downloaded contents or uploaded materials.

Blocking inappropriate materials

Walmart may utilize specific software for identifying inappropriate as well as sexual overt internet websites.

Prohibited activities

All users are prohibited from using the internet in accessing or sending content that falls under fraud, harassment, embarrassment, sexual obscenity, intimidation and defamatory or any other materials that violate the national and international laws or that of Walmart (Stewart, 2000).

Illegal copying

Users are restricted from copying or downloading copyright materials protected by law. All employees are required to comply with these laws without exception.

  Conclusion

Security measures in an organization help in protecting the company from external security threats, improper use of company computer resources and protect the company data from misuse. Email and internet user policies for Walmart have been established to ensure that the company complies not only with international internet policies but also National and company policies. The strategies discussed when well utilized could significantly protect the company computers and the internet from security threats.

 

 

 

 

 

 

 

 

 

 

 

References

Robson, K., & Pitt, L. (2018). People of Walmart: Targeting the world’s largest retailer and its   customers. SAGE Publications: SAGE Business Cases Originals.

Rusk, M. (2001). Acceptable use policies: Four examples from community college libraries. Community & Junior College Libraries10(2), 83-90.

Siau, K., Nah, F. F. H., & Teng, L. (2002). Acceptable internet use policy. Communications of the ACM45(1), 75-79.

Stewart, F. (2000). Internet acceptable use policies: Navigating the management, legal, and        technical issues. Information Systems Security9(3), 1-7.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask