Remote Access Policy

Remote access to our corporate network is essential but in many cases this remote access originates from networks that may already be compromised or are at a significantly lower security posture than our corporate network. While these remote networks are beyond the control of CodeBee.'s policy, we must mitigate these external risks the best of our ability.

Purpose

The purpose of this policy is to define rules and requirements for connecting to CodeBee's network from any host. These rules and requirements are designed to minimize the potential exposure to CodeBee from damages which may result from unauthorized use of CodeBee resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical CodeBee internal systems, and fines or other financial liabilities incurred as a result of those losses.

Scope

This policy applies to all CodeBee employees, contractors, vendors and agents with a CodeBee-owned or personally-owned computer or workstation used to connect to the CodeBee network. This policy applies to remote access connections used to do work on behalf of CodeBee, including reading or sending email and viewing intranet web resources. This policy covers any and all technical implementations of remote access used to connect to CodeBee networks.

Policy

  • It is the responsibility of CodeBee's employees, contractors, vendors and agents with remote access privileges to CodeBee's corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to CodeBee.
  • When accessing the CodeBee network from a personal computer, Authorized Users are responsible for preventing access to any CodeBee computer resources or data by non-Authorized Users. Performance of illegal activities through the CodeBee network by any user (Authorized or otherwise) is prohibited. The Authorized User bears responsibility for and consequences of misuse of the Authorized User’s access.
  • Authorized Users will not use CodeBee networks to access the Internet for outside business interests.

Requirements

  • Secure remote access must be strictly controlled with encryption (i.e., Virtual Private Networks (VPNs)) and strong pass-phrases.
  • Authorized Users shall protect their login and password from anyone.
  • While using a CodeBee-owned computer to remotely connect to CodeBee's corporate network, Authorized Users shall ensure the remote host is not connected to any other network at the same time, with the exception of personal networks that are under their complete control or under the complete control of an Authorized User or Third Party.
  • All hosts that are connected to CodeBee internal networks via remote access technologies must be kept upt-to-date.

Contact opnemen

Interesse?

Benieuwd naar de mogelijkheden voor uw organisatie? Neem contact op!

Uw naam *

Uw e-mailadres *

Uw bericht *

0/500