Cyber Security at Richman Investments


To stop malware problems from occurring at Richman Investments Protecting Richman investments employees, partners and company from illegal or damaging actions by individuals either knowingly or unknowingly Internet /intranet/ extranet related systems including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, www browsing, and FTP, are the property of Richman investments. These systems are to be used for business purposes in serving the interests of the company and of our clients and customers in the course of normal operations


The purpose of this policy is to mitigate the improper use of company computer asset these rules are in place to protect the employee and Richman investments.

Inappropriate use exposes Richman investments to risks including virus attacks, compromise of network systems and services, and legal issues.


I would like to implement a new AUP policy to stop these problems from occurring they need to design an AUP to let user know what they can or can’t do on the system.

Get quality help now
checked Verified writer

Proficient in: Cyber Security

star star star star 4.7 (348)

“ Amazing as always, gave her a week to finish a big assignment and came through way ahead of time. ”

avatar avatar avatar
+84 relevant experts are online
Hire writer

And use the IT department to restrict access to removable devices.


  1. While Richman investments network administration desires to provide a reasonable level of privacy, users should be aware that the data they create on the corporate systems remains the property of Richman investments. Because of the need to protect Richman investments network, management cannot guarantee the confidentiality of information stored on any network device belonging to Richman investments.
  2. Employees are responsible for creating guidelines concerning personal use of Internet/Intranet/Extranet systems.
    Get to Know The Price Estimate For Your Paper
    Number of pages
    Email Invalid email

    By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

    "You must agree to out terms of services and privacy policy"
    Write my paper

    You won’t be charged yet!

    In the absence of such policies, employees should be guided by departmental policies on personal use and if there is any uncertainty, employees should consult their supervisor or manager.

  3. For security and network maintenance purposes, authorized individuals within Richman investments may monitor equipment systems and network traffic at any time.
  4. Richman investments reserve the right to audit networks and systems on a periodic basis to ensure compliance with this policy.

Security and Proprietary Information

  1. The user interface for information contained on internet/intranet/Extranet related systems should be classified as either confidential or not confidential, as defined by corporate confidentiality guidelines details of which can be found in the HR policies. Examples of confidential information include but are not limited to company private, corporate strategies, competitor sensitive, trade secrets specifications, customer lists, and research data. Employees should take all necessary steps to prevent unauthorized access to this information.
  2. Keep passwords secure and do not share accounts. Authorized users are responsible for the security of their passwords and accounts. System level passwords should be changed quarterly; user level passwords should be changed every six months.
  3. All PCs, laptops and workstations should be secured with a password protected screensaver with the automatic activation feature set at 10 minutes or less or by logging off when the host will be unattended.
  4. Use encryption of information in compliance with acceptable encryption n use policy
  5. Postings by employees from a Richman investments email address to new groups should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of Richman investments unless posting is in the course of business duties.
  6. All host used by the employee that are connected to the Richman investments , Internet/Intranet/Extranet, whether owned by the employee or Richman investments shall be continually executing approved virus scanning software with a current virus database unless overridden by departmental or group policy.
  7. Employees must use extreme caution when opening email attachments received from unknown senders which may contain viruses, email bombs, or Trojan horse code.

Unacceptable use

The following activities are in general prohibited. Employees may be exempted from these restrictions during the course of their legitimate job responsibilities system administration staff may have a need to disable the network access of a host if that host is disrupting production services. Under no circumstances is an employee of Richman investments authorized to engage in any activity that is illegal under local, state, federal or international law while utilizing Richman investments owned resources.

Email and communications activities

  1. Sending unsolicited email messages including the sending of junk mail or other advertising material to individuals who did not specifically request such material email spam.
  2. Any form of harassment via email, telephone or paging whether through language, frequency or size messages.
  3. Unauthorized use or forging of email header information.
  4. Solicitation of email for any other email address other than that of the poster’s account with the intent to harass or collect replies. Enforcement Any employee found to have violated this policy may be subject to disciplinary action up to and including termination of employment.
Cite this page

Cyber Security at Richman Investments. (2016, Jun 13). Retrieved from

Cyber Security at Richman Investments
Live chat  with support 24/7

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment