NetworkConnectivityPolicy
Last updated: January 20, 2023
Introduction
- This policy sets out Zoracom’s requirements regarding connecting devices to our networks.
- This policy applies to all staff, including employees, contractors and interns etc. working for, or under the control of Zoracom.
Responsibilities
- The IT Manager is responsible for all aspects of the implementation and management of this procedure, unless noted otherwise.
- IT department operates this policy to ensure the security and appropriate use of Zoracom Networks, and to allocate access to network resources and bandwidth in an equitable manner
Network policy
- This policy advises users regarding the specifics of connecting devices to the network.
- Users may only connect to the network from those locations that IT department has designated as connectivity points: voice/data jacks or separate demarcation points
- These connections are limited to end-point devices such as PCs, notebooks, workstations, printers, or other terminating devices.
- Users may not extend or modify the network in any way by installing devices such as repeaters, bridges, switches, routers, gateways, wireless access points, or permanent hubs unless specific permission has been obtained from IT department.
- Users may not install mail servers without first discussing their project requirements with IT department.
- Any mail servers found not registered will be summarily blocked by IT department and disciplinary action may be taken.
- Users must seek prior authorisation from the IT Manager before they install web, application, music, or other types of servers or devices designed to provide file, print, application, or access services.
- Users must use network services provided by IT department, and not attempt to provision network services such as IP address assignment (i.e., DHCP servers), DNS, or other management services.
- Any piece of equipment that is found in violation of these requirements will be subject to immediate disconnection
Endpoint security at Zoracom
- Zora Communication staff should take the following steps to ensure the security of the endpoints they use to perform their work.
- Zoracom I.T Administrator is responsible for installing critical firmware and software updates on the endpoints they use exclusively or those where they're the assigned owner. All communal assets (like large TVs etc.) should have assigned owners.
- Zoracom requires that all endpoints with access to production systems use an antivirus software to protect themselves and our production infrastructure from malware.
- All Zoracom staff are required to turn on the hard disk encryption option of their respective operating systems (ex: File vault on Mac).
- As detailed in the password policy, Zoracom staff should use strong passwords to protect unauthorized access to their system or any services they use. It is recommended that passwords are changed every Three (3) Months periodically.
- All Zoracom staff must turn on auto-screen-lock on their systems within a reasonable amount of inactive period. While the screen lock will protect your device in most cases, it is recommended that you do not leave your computer unattended and unlocked.
- Employees must immediately report lost, stolen, or damaged devices to the Zoracom management, which will then attempt to constrain access to production systems and customer data through the exposed device.
- Employees must follow the removable media guidelines outlined in Physical Security Policy.
- Endpoints may be verified for compliance to this policy through various methods, including but not limited to, periodic reviews, platform monitoring, and internal and external audits.
Breaches of policy
- Zoracom will take all necessary measures to remedy any breach of this policy including the use of our disciplinary or contractual processes where appropriate.