Security | Optimize

Peer To Peer Policy

Peer-to-peer networks--such as BearShare, Kazaa, LimeWire, Morpheus, and others--present numerous significant security threats to organizations. Permitted on a network, the operation of such file-sharing programs opens your organization to international copyright violations, virus infestation, lost or corrupted data, congested network traffic, and lost productivity. As such, you can use this Peer To Peer Policy to ensure organization data and systems are protected as required by legal and industry regulations.

The Peer To Peer Policy exists to ensure all organization information, computers, and systems are protected from the detrimental effects of peer-to-peer file sharing programs, applications, and networks. This file includes a policy you can customize to meet your needs as well as a risk assessment spreadsheet you can use to judge just how much your organization is at risk by not having this policy in place.

Format:
WORD
Size:
1800 KB
Version:
Date:
Aug 2006
Author:
Tech Pro Research
Topic:
Security

Download Now

Not a Tech Pro Research member?
Sign up for a Free Trial and get access
to Tech Pro Research for one week.

People who downloaded this also downloaded