Business and procedures
Prepared by
Olivia Hommerding
ID 2012002955
Prepared for
Ken York
Table of Contents 1. Business Policies and Procedures 3 1.1 Security Measures 3 1.2 Disaster Recovery Plan 4 1.3 Acceptable Use Policies 4 1.4 Maintenance Tasks 5 1.4.1 Back Up Schedule 6 APPENDIX 1 7 Worry-free Business Security Services 7 APPENDIX 2 8 Code of Behaviour 8
1. Business Policies and Procedures
1.1 Security Measures
* Physical security of computer: The computer is to be located in a secure storage cabinet on the front desk/office area, which can be shut and locked up during the time the gym in unsupervised and/or without any staff on site. Considering it is a 24/7-access amenity, only members may access the facilities outside normal business hours. Their access is granted by their unique identification magnetic card that unlocks the entrance and registers their access time to the building. Surveillance video cameras are to be operating at all the time.
* For data and software protection, Dell provides (with our computer purchase choice), Trend Micro Worry-Free Business Security Service for 15months – as described in the Computer Specifications Table (Appendix 1, Part A of this assignment).
Specifically designed to benefit small and mid-size businesses, this software protects against viruses, hackers, spyware, phishing and data theft. For more information refer to appendix 1 for specifications and protection offered by this service.
To reinforce the safety of the business data and to allow better control over staff computer and Internet usage, a login code/password is to be required to access the computer and its applications. Login codes and access restrictions are to be included as part of the induction and training process. Access and constraints to information are given due to the job nature and degree of responsibility of each staff member (for example, manager will have complete access, manager assistant