[ad_1]
A computer security policy sets protocols for intrusion detection, user access, and data storage. IT departments determine policies, including external security and disaster recovery plans. Access to the internet and programs can be limited based on job roles.
A computer security policy is a set of security protocols that a user or an organization establishes for their computers. Typically includes intrusion detections, firewall settings, user access passwords, logins, and procedures for using certain hardware and software applications. The type of computer security policy used can vary greatly for different corporate and home computer networks.
An organization’s IT department is usually responsible for determining and setting up an information security policy. The department must establish a set of user-level access protocols. For example, some users may be granted permission for certain features and software packages that others do not. In some cases, some types of access are restricted to all employees. A common example is that computer users in most workplaces are prohibited from visiting certain websites that contain objectionable material or allow a worker to conduct personal business while at work.
External security is a vital component of any policy model. You can use encryption methods and private networks to prevent unwanted access. Additionally, a computer security policy can also establish individual firewalls and security settings.
Part of a computer security policy specifies how data can be stored and transferred between users. Some protocols allow data to be transferred from a user’s individual workstation to an external drive or uploaded as an e-mail attachment. Other policies can limit these privileges and allow users to share data only on a common network folder. Remote access to certain programs and network folders can be allowed with certain login credentials.
Another important part of any computer security policy determines how users can access the Internet and the programs that send data over it, such as e-mail and instant messaging. It is quite common for a computer security policy to grant access and use of some of these programs to certain users while limiting others. For example, in a call center, higher-level positions that require a greater amount of communication might need access to these tools, while lower-level agents who primarily take inbound calls might find them distracting. Some companies adopt a global policy and grant access only to senior staff.
Disaster recovery policies are sometimes part of a formal computer security protocol. Most of this area of security has to do with backup storage and who gets access to which data in the event of natural disasters wiping out entire systems. Scheduled virus outbreaks or server crashes can also affect your data backup policies. An organization’s IT department will typically be responsible for designing recovery plans, assigning touchpoints and responsibilities, and educating workplace users on what to do to prepare for such events.