Internet and computer security policies for Walmart
Introduction
The security of the organization’s roles lies with the Chief Security Officer. Over the past few years, research has consistently shown that malwares and viruses gain access to the organization’s security systems through emails and internet use. Emails that come from unknown senders are mostly used for these purposes. This paper will discuss computer besides email acceptable use policies as well as Internet fair use policies for Walmart company.
Computer and email acceptable use policy
Walmart takes much consideration of how employees use emails within the company system. The plans are aimed at maintaining better security measures (Robson & Pitt, 2018). Due to this the organization has put in place acceptable computer and email user policies;
All personal messages coming through the company computers are treated similarly to any other word in the system. Therefore, they cannot be archived continuously because they can be retrieved even after deletion by the user.
Users are required to acknowledge that all emails besides internet visits reflect the name of the organization (Rusk, 2001). Therefore, accuracy and appropriacy should be ensured to protect the company from possible liabilities.. Don't use plagiarised sources.Get your custom essay just from $11/page
All company staff must ensure they keep and protect their passwords used in emails from any other person. The IS department will retain all abilities to maintain employee passwords for various reasons, which may include resetting of the passwords if forgotten to check email accounts are required or deletion of email servers.
Company computer cannot be used for accessing or obtaining or downloading any materials which may be deemed insulting, disrupting or offensive by other people or be harmful (Rusk, 2001). The item for this class may include graphics that are considered harassment if not disparaging in regards to sex, race or sexual orientation.
Bounced mails
If any company employee receives a bounced email which the MIS forward to them, especially if the message comes from you have regular communication, the employee is required to write the sender and alert them of the email address. This rule applies to all email mistakes (Robson & Pitt, 2018).
Attachments
Receiving
Any email coming from an unknown sender should be immediately be deleted without reading. If the attachment is suspicious, alert the CIO. This is because of viruses spread through email attachments, which seem legitimate ((Robson & Pitt, 2018).
All emails coming from unknown senders should be scanned for possible viruses before opening. No user is allowed to disable automatic scanners, and if the user realizes that the scanners are working, notify the CIO.
Sending
All attachments should be a maximum of 1.5m. Attachments with storage requirements above the limit may result in the crashing of the email client leading to server issues.
In case a user wishes to send a file larger than the required size, he/she should inform the IS department before sending the data. This will enable the department to split the email into various parts, which will allow the sending of the email (Robson & Pitt, 2018). Upon finishing the sending process, delete the emails to avoid extra space consumption.
Storage, filing and maintenance
In case the user receives and reads an email, and they want to store it, use the appropriate folder within the Quick-mail.
Internet acceptable use policy
Walmart is compliant with internet use policies, which enable the company to evade liabilities and help users protect the company systems from external infiltration and security threats (Robson & Pitt, 2018). The company has put in place Internet Acceptable User policies which will help the company protect its internet use;
Disclaimer liabilities of using internet
Walmart will not be responsible for any content viewed or downloaded by company employees from the web (Siau, Nah & Teng, 2002).
Users have the duty not to waste computer resource
Users are prohibited from deliberately performing actions that result in wastage of computer resources or limits the use of the computer by others in the company. The activities may involve but limited to mass email or chain letter sending, heavy periods on the internet, games, online chatting, printing many different document copies and also the creation of network traffic.
No privacy expectations
All counts allocated to users are only meant to facilitate their working and completion of their tasks. No user should expect privacy when creating, storing, sending or receiving anything through the system (Robson & Pitt, 2018). All computers belong to Walmart and must not be used for personal benefits.
Monitoring computer usage
Walmart retains the right and not the duty to monitor any as well as all activities within the network. This may include monitoring of user visit sites, chat groups, downloaded contents or uploaded materials.
Blocking inappropriate materials
Walmart may utilize specific software for identifying inappropriate as well as sexual overt internet websites.
Prohibited activities
All users are prohibited from using the internet in accessing or sending content that falls under fraud, harassment, embarrassment, sexual obscenity, intimidation and defamatory or any other materials that violate the national and international laws or that of Walmart (Stewart, 2000).
Illegal copying
Users are restricted from copying or downloading copyright materials protected by law. All employees are required to comply with these laws without exception.
Conclusion
Security measures in an organization help in protecting the company from external security threats, improper use of company computer resources and protect the company data from misuse. Email and internet user policies for Walmart have been established to ensure that the company complies not only with international internet policies but also National and company policies. The strategies discussed when well utilized could significantly protect the company computers and the internet from security threats.
References
Robson, K., & Pitt, L. (2018). People of Walmart: Targeting the world’s largest retailer and its customers. SAGE Publications: SAGE Business Cases Originals.
Rusk, M. (2001). Acceptable use policies: Four examples from community college libraries. Community & Junior College Libraries, 10(2), 83-90.
Siau, K., Nah, F. F. H., & Teng, L. (2002). Acceptable internet use policy. Communications of the ACM, 45(1), 75-79.
Stewart, F. (2000). Internet acceptable use policies: Navigating the management, legal, and technical issues. Information Systems Security, 9(3), 1-7.