11.14 – Email Security

11.14 – Email SecurityPolicy StatementAll members of Virgin Valley Disposal (VVD) are responsible for protecting the confidentiality, integrity, and availability of data created, received, stored, transmitted, or otherwise used by VVD.VVD reserves the right to restrict the use of information technology resources in order to preserve data security or comply with law or policy.In order […]

Read More

11.13 – Directory

11.13 – DirectoryPolicy StatementAll VVD employees are responsible for maintaining a Directory profile which contains accurate, updated, and relevant information about their position at the Company.Reason for PolicyMaintaining a complete, accurate, and updated profile in the Directory fosters and eases communication among individuals at Virgin Valley Disposal.Entities Affected by this PolicyVirgin Valley DisposalWho Should Read […]

Read More

11.12 – Restricting Network Access for Insecure Systems

11.12 – Restricting Network Access for Insecure SystemsPolicy StatementThe Information Technologies & Services (ITS) Security & Identity Management team at Virgin Valley Disposal must take appropriate action to assess, evaluate, and mitigate any threats that pose a serious risk or impact to VVD information data. If an information system connected to the VVD network appears […]

Read More

11.11 – Requirements for Securing Information Systems

11.11 – Requirements for Securing Information SystemsPolicy StatementInformation systems must be secured according to a set of standards and principles in order to prevent unauthorized access to Virgin Valley Disposal data and applications.Reason for PolicyIn order for Virgin Valley Disposal to allow information systems to reside on the Virgin Valley Disposal network, certain security protocols […]

Read More

11.10 – Web Proxy

11.10 – Web ProxyPolicyVVD has implemented a Web proxy on the company network. The Web proxy is an integral component of VVD’s network security program, sitting in between the user and the Internet (see diagram below). When a user requests Web resources (such as a Web site) from inside the VVD network, the proxy will […]

Read More

11.09 – Data Loss Prevention

11.09 – Data Loss PreventionPolicyAll members of Virgin Valley Disposal (VVD) community are responsible for protecting the confidentiality, integrity, and availability of data created, received, stored, transmitted, or otherwise used by the company. VVD reserves the right to restrict the use of Information Technology Resources in order to preserve data security or comply with law […]

Read More

11.08 – Use of Email

11.08 – Use of EmailPolicy StatementVirgin Valley Disposal (VVD) provides a centrally-managed email service to employees, and affiliates for the purpose of furthering the mission of VVD.  While incidental and occasional personal use of email is permissible, personal communications and data transmitted or stored on VVD information technology resources (such as email) are treated as […]

Read More

11.07 – Copyright Infringement Policy

11.07 – Copyright Infringement PolicyUpon formal notification or due to detection, and in accordance with VVD policy 11.1 – Responsible Use of Information Technology Resources, VVD will take all necessary means, including but not limited to temporary disconnection from internet access or the company network, to stop illegal sharing of copyrighted material by users of VVD […]

Read More

11.06 – Device Encryption

11.06 – Device EncryptionPolicy StatementAll users of desktops, laptops, tablets, and mobile devices (whether Information Technologies & Services [ITS] tagged or untagged) must take care to protect confidential data. All devices tagged by ITS and used for VVD purposes must be encrypted using an ITS-managed encryption solution unless otherwise exempted as defined in this policy. […]

Read More

11.05 – Security and Privacy Incident Response Plan

11.05 – Security and Privacy Incident Response PlanPolicy StatementAll employees of Virgin Valley Disposal are responsible for protecting the confidentiality, integrity, and availability of data created, received, stored, transmitted, or otherwise used by the company, irrespective of the medium on which the data resides and regardless of format (e.g., electronic, paper, fax, CD, or other […]

Read More