Required VPN Usage:
This policy to all Rego W2 based employees and contracts, referred to hereafter as “employees”. Rego’s Corporate VPN should be used in any whenever a Rego employee is connected to networks outside your of their home /or workspace, this . This includes any networks on: in public places, airports, travelwhile traveling, or any other location or network not setup set up under the consultant’s Rego employee’s supervision. The consultant is responsible for any potential breaches if the VPN was not in use, if the consultant It is the responsibility of the Rego employee to ensure the VPN is running at all times in these situations.
If the Rego employee prefers to use a third-party VPN provider, this is subject to approval by the IT Department. As of 0108/01/2024 only the following VPN vendors are allowed:
o ExpressVPN
o NordVPN
o SpeedifyVPN MisusePolicies:
Avoid misuse or unacceptable uses of the corporate VPN that can end on could result in administrative action, this . This list may not contain cover all cases scenarios, but an example examples of the unacceptable use include:
o Port scanning or security scanning unless prior notification is given to and authorization is granted.
o Executing any form of network monitoring which will intercept data not intended for the user’s device.
o Circumventing user authentication or security of any device, network, or account. Escalating privileges or in any way circumventing the authorization restrictions imposed by a system.
o Escalating privileges or in any way circumventing access restrictions that you have been given by the Company by an authorized individual.
o Interfering with or denying service to any user other than the user’s device (for example, a
denialDenial of
serviceService attack).
o Using any program, script, or command, or sending messages of any kind, with the intent to interfere with or disable a user’s computing session using any connection means, whether locally or using the Internet, intranet, or extranet.
o Interfering with, attempting to bypass, or disabling network and device security systems.
o Traffic or downloads unrelated to Rego,
likesuch as streaming services, file downloads,
download of filesor P2P file
shareingsharing.
Policy Download:
View file | ||
---|---|---|
|