If you wish to effectively discourage attempts at unauthorized access by employees and emphasize your organization’s position on security, you can establish a procedure to handle excessive attempts at unauthorized access to your computer resources.
Consider the following procedure for handling excessive violations:
The review panel must have management backing and proper authority to enforce any agreed upon action.
Note: At this point, you can continue to monitor the user’s activity. If the excessive violation pattern continues, you are prepared to take action against the user, possibly dismissal. Management must, of course, support this type of action.
|
Copyright © 2009 CA.
All rights reserved.
|
|