preview

Computer Security : Computers And Networks

Decent Essays

Accessing other user’s files: Users may not alter or copy a file belonging to another User without first obtaining permission from the owner of the file. Ability to read, alter, or copy a file belonging to another User does not imply permission to read, after, or copy that file. Users may not use the computer system to “snoop” or pry into the affairs of other users by unnecessarily reviewing their files and e-mail.
Accessing other computers and networks: A User’s ability to connect to other computer systems through the network or by a modem does not imply a right to connect to those systems or to make use of those systems unless specifically authorized by the operators of those systems.
Computer security: Each User is responsible for ensuring that use of outside computers and networks, such as the Internet, does not compromise the security of CyberTech’s Computer Resources. This duty includes taking reasonable precautions to prevent intruders from accessing the company’s network without authorization and to prevent introduction and spread of viruses.
Viruses
Virus detection: Viruses can cause substantial damage to computer systems. Each User is responsible for taking reasonable precautions to ensure he or she does not introduce viruses into CyberTech’s network.
Users should make sure that virus detection software is loaded on their computers and that it is turned on at all times. All material received on floppy disk or other magnetic or optical medium and all material

Get Access