Dealing with the temporary employee

Dealing with the temporary employee
Adesh Rampat

Organizations may from time to time employ personnel on a contractual or temporary basis to assist in various projects. This may require the temporary employee to utilize company computer equipment to perform their jobs. All temporary personnel that will be using the organization's computer equipment to perform their job function must become familiar with the organization's computer security policy. The network administrator must also perform the following additional security measure:

  • Create a new account for the temporary employee. This account must have the hours of log on and log off. Do not use the guest account.

  • Include an expiration date for each temporary account. In most cases this is the date on which the employment contract expires. You can alter the date in the event that the temporary employee needs to stay on.

  • Create a group account that will include only temporary personnel. Apply necessary log-on scripts. For example, there may be a standard log-on script for permanent employees that may not apply to the temporary user.

  • Be aware that when a new user is created, he/she automatically becomes a member of the group "everyone." To prevent the temporary user from accessing certain folders that the group "everyone" has access to, apply the temporary group account to these folders.

  • Limit access to network browsing.

  • Email access with SMTP addresses should be prevented, because company information can easily be sent to unauthorized sources. However you may be required to assign a SMTP email address, and if so, you should periodically submit reports on mail-server communication logs located in most firewall software to track any communication that may be a threat to the company.


Adesh Rampat has 10 years experience with network and IT administration. He is a member of the Association of Internet Professionals, the Institute for Network Professionals, and the International Webmasters Association. He has also lectured extensively on a variety of topics.

Did you like this tip? If so, (or if not) why not let us know. Send an email to us and sound off. Or visit our tips page to rate this tip, or submit one of your own.

Related book

Principles of Systems and Network Administration
Author : Mark Burgess
Publisher : John Wiley & Sons
Published : Aug 2000
Summary :
System administration is the organization and running of computer networks. This book focuses on the general principles involved in setting up configuring and maintaining computer communities.


This was first published in March 2001

Dig deeper on Microsoft Active Directory Design and Administration

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchServerVirtualization

SearchCloudComputing

SearchExchange

SearchSQLServer

SearchWinIT

SearchEnterpriseDesktop

SearchVirtualDesktop

Close