Network policies are documents written to outline the rules that users are required to follow while using a computer network. Each document is often several pages long, written and agreed by a committee.Network users will be expected to follow to the rules. These will be:
Do notgamble
Do notinstall unauthorised software
Nohate speech
Visiting 'obscene' websites
Noleaking data/ insider trading
Disaster recovery
Given the amount of important data often stored on a computer network, it is essential that an effective disaster recovery policy be in place. Disasters include:
Fire, flood, lightning, terrorist attacks etc.
Hardware failure, e.g. power supply unit failing
Software failure, e.g. virus damage
There are usually three parts to a disaster recovery policy:
Before the disaster: risk analysis, preventative measures and staff training
During the disaster: staff response – implementingcontingency plans
After the disaster: recovery measures, purchasingreplacement hardware, reinstalling software, restoring data from backups.
Backups
A backup is a copy of data that can be used if the original data is lost. A backup policy sets out how often and to what medium backups are made. The backup medium is generallydifferent to the active storage medium.
What is the grandfather-father-son method?
Oldest back up will be named grandfather, second oldest named father, youngest named son. When a new backup is made the grandfather becomes the son, the son becomes the father and the father becomes the grandfather
Archiving
The process of storing data that is no longer in current or frequent use. It is held for security, legal or historical reasons.