O'Reilly logo

Essential Check Point™ FireWall-1® NG: An Installation, Configuration, and Troubleshooting Guide by Dameon D. Welch-Abernathy

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix B. Sample Acceptable Usage Policy

The following is a sample Acceptable Usage Policy.

Company X Information Security PolicySection 003: Internet Access and Usage

SUMMARY

While Company X wants to maintain our culture of trust, openness, and integrity, we must also protect employees, partners, and the company itself from illegal or damaging actions by individuals, either knowingly or unknowingly. This document describes Company X's official policy regarding Internet security and access.

Internet/intranet/extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, WWW browsing, and FTP, are the property of Company X. These systems are to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required