Previous Topic: Monitoring Discourages Violation AttemptsNext Topic: Conclusion


Elements of Procedure

If you wish to effectively discourage attempts at unauthorized access by employees and emphasize your organization’s position on security, you can establish a procedure to handle excessive attempts at unauthorized access to your computer resources.

Consider the following procedure for handling excessive violations:

Note: At this point, you can continue to monitor the user’s activity. If the excessive violation pattern continues, you are prepared to take action against the user, possibly dismissal. Management must, of course, support this type of action.