Sample essay on xyz remote access policy

Saturday, April 11, 2015.

This XYZ remote access policy is designed and written specifically for XYZ Healthcare Provider

The XYZ remote access policy is designed and written with the primary purpose of describing standards for people who use the network XYZ Healthcare Provider or connect it to any host. These rules and standards are designed in such a way as to minimize the potential risks and damages that XYZ might entail as a result of an unauthorized use of the enterprise’s services. Such potential risks and damage may include the destruction of important internal systems, the loss of confidential and sensitive information, and intellectual property, and even a common image, inter alia,

The XYZ remote access policy affects all individuals who can connect or use the XYZ network, including company personnel, contractors, suppliers, agents, patients and suppliers, as well as any other person or group of individuals. In addition, the policy also applies to remote access connections that perform various tasks on behalf of the XYZ company, including sending or reading e-mail messages and scanning through Web resources on the internal network

The XYZ Remote Access Policy will cover remote implementations of ISDN access, VPN, SSH, DSL, modem cables, modems to connect the cable, frame relay, modems, and other channels that can connect remotely, except those that connect through Web interfaces

  • For secure remote access, you will have strict controls that will be used with the same password
  • All people who have access to the XYZ remote connection, including employees, contractors, patients, agents and suppliers, will not be able to share registration information with other people, including family members
  • The company will explain and help each employee, contractor, patient, agent and vendor who have access to remote connections, or through the company or private computers, or the workstations connected to the XYZ network must not be connected to any other network at the same time
  • The company will prohibit all employees, contractors, patients, agents and suppliers of the remote access concession owned by the company or private computers or workstations that can be connected remotely to the internal network of the XYZ company
  • XYZ requires additional frame-relay to meet the minimum preconditions for checking the DLCI standards
  • CHAP prerequisites must be met by all routers for ISDN lines specifically designed to access the XYZ network
  • It is required for all remote hosts that can connect to the internal network of the XYZ company through remote access technology to use updated anti-virus software in addition to the operating system patches in good working patches
  • Each person affected by this policy will be given a detailed account of how the implementation will be and will be implemented. Training will also be conducted starting next week at the department level to gain knowledge of how to implement these rules. The policy review will take place every three months
  • Given that this policy is new and has never been implemented by the agency before, it is expected that staff may experience difficulties in complying with certain rules, particularly those relating to the sharing of the details of the entry into the system or equipment with family members. However, violations of any regulations will be punished and those who are found to be in breach will be suspended or will not have access to remote access

    The risks of using the public Internet for remote access

  • Private networks can be risky to spread viruses and worms because they do not guarantee the full protection of remote devices from software configuration and vulnerability
  • Effects on worms and malware could threaten the company’s system, leading to illegal access to remote access connections. This could lead to the introduction of malicious code into the organization’s network (Ballad et al., 2011)
  • Access to the network by outsiders can be used for unlawful purposes, such as obtaining personal information that can increase susceptibility to attacks and ultimately loss of information, data or money if the organizations are required to pay the ransom by hackers (Gregory, 2010)
  • A remote access policy is required

  • This policy ensures that every staff member will be aware of where, when and how to use the Internet company and will not use the concession
  • Stops or completely excludes the impact of the organization’s network on worms, viruses and malware from external devices
  • It increases the responsibility for the use of the Internet in the organization (Eckel, 2006)
  • This ensures that the company’s resources are used for organizational needs, not for personal achievement (Shoemaker & Conklin, 2012)
  • It refers to actions to be taken in the event of a violation by staff of a code of ethics with regard to the use of the Internet
  • Ballad, B., Ballad, T., and Banks, E. K. (2011).

    Eckel, E. (2006, 19 July). The importance of the remote access policy.

    Gregory, P. (2010).

    Shoemaker, D., & Conklin, W. A. (2012).

    What you can read next