FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

COMPUTER SECURITY POLICIES EXAMPLES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
True or False:An internet access policy states what files on your computer you are allowed to access
A
True
B
False
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -In a nutshell – an Internet Access Policy (IAP) is a document, that allows software vendors to declare and describe the Internet usage of their programs. It is comparable to a Privacy Policy.

Detailed explanation-2: -An internet usage policy should include the following: A notification that all aspects of employee use of company-owned equipment can be monitored at any time and without notice. A statement of the reasons for the policy. A description of what constitutes improper use of employer-owned equipment.

Detailed explanation-3: -A web browser is a computer application or a mobile application that is used to access the world wide web or the internet. A web browser can be used for accessing websites as well as for various purposes such as playing audio/video and games, sharing files, emails, etc.

Detailed explanation-4: -A disclaimer is often included in an AUP absolving the organization from responsibility for a data breach, malware or other issue. Statements about when a person is in violation of this policy and when law enforcement might be called in could also be included.

There is 1 question to complete.