PRIVATE AND CONFIDENTIAL

(This policy serves as a guide for managed services that do not have a corresponding policy)

Security Policies – Web Proxy

  1. Policy Statement
    1. Business is recommended to implemented a Web proxy on the business network to have the ability to enforce security policies such as Data Loss Prevention and Copyright Infringement Policy. The Web proxy is an integral component of Business’s network security program, sitting in between the user and the Internet. When a user requests Web resources (such as a Web site) from inside the business network, the proxy will evaluate the request and respond according to its filtering rules.
    2. By using a Web proxy to act as an intermediary between the user and the Internet, users will benefit from security features that protect them from harmful Web content while continuing to experience a high level of network performance and access to required resources.
    3. A Web proxy has the ability to perform the following services:
    4. Filter Web content and block access to malicious Web sites
    5. Scan transmitted content for malware or other harmful material
    6. Inspect and intercept certain network traffic to prevent data loss
    7. Increase network performance by caching (storing) commonly-used resources
    8. The Web proxy is designed to provide these services without negatively affecting network performance and user experience.
  2. Reason for Policy
    1. The Web proxy is being used in conjunction with other Business security tools to protect confidential data. The purpose of this policy document is to provide an overview of the Web proxy on the Business network, and to educate users on the proxy’s features and benefits.
  3. Who Should Read this Policy
    1. All users of Business.
  4. Principles
    1. Business Users should not expect that personal communications will remain private and/or confidential. While the business permits generally unhindered use of its information technology resources, those who use Business information technology resources do not acquire, and should not expect, a right of privacy.
  5. Procedures
    1. The Web proxy when activated on request with the appropriate licenses will actively monitor network traffic on select areas of the campus network. Business Users should not notice any significant change in their network performance, and should continue to abide by existing policies for appropriate use of ITS resources as provided in the ITS polices page.