Professional Documents
Culture Documents
Raul Mendoza
CSOL-540
Clay Wilson
April 9, 2018
ASSET PROTECTION POLICY 2
I. Scope
This policy establishes HIC standards for the protection of company assets. It is
important that all employee’s, contractors, part-time and temporary workers, and
those employed by others to perform work on HIC systems, networks, data
integrity and organizational assets understand and enforce this policy.
All HIC assets connected to HIC networks must have supported anti-virus
software installed, updated, and running at all times. Any asset found with
malware or infected by malicious software will be removed from the network
until it can be verified that the asset is virus free.
II. Objectives
i. Adware
ii. Bot
iii. Bug
iv. Ransom
v. Rootkit
vi. Virus
III. Responsibilities
Any HIC member who violates this Policy may be subject to disciplinary action
up to, and including, termination of employment. Additionally, individuals may
be subject to loss of HIC’ Information Resources access privileges and, if
warranted, civil or criminal prosecution under California or federal law.
References
https://www.malwarefox.com/malware-types/
U.S. Department of Health & Human Services. (2015). What do the HIPAA Privacy and
Security Rules require of covered entities when they dispose of protected health
does-hipaa-require-of-covered-entities-when-they-dispose-information/index.html