Not a Tech Pro Research member? Sign up for a Free Trial and get access to this content and more for one week.
Peer To Peer Policy
- Originally Published:
- Aug 2006
Peer-to-peer networks--such as BearShare, Kazaa, LimeWire, Morpheus, and others--present numerous significant security threats to organizations. Permitted on a network, the operation of such file-sharing programs opens your organization to international copyright violations, virus infestation, lost or corrupted data, congested network traffic, and lost productivity. As such, you can use this Peer To Peer Policy to ensure organization data and systems are protected as required by legal and industry regulations.
The Peer To Peer Policy exists to ensure all organization information, computers, and systems are protected from the detrimental effects of peer-to-peer file sharing programs, applications, and networks. This file includes a policy you can customize to meet your needs as well as a risk assessment spreadsheet you can use to judge just how much your organization is at risk by not having this policy in place.
Already a member? Log in here