Tip

Dealing with the temporary employee

Dealing with the temporary employee
Adesh Rampat

Organizations may from time to time employ personnel on a contractual or temporary basis to assist in various projects. This may require the temporary employee to utilize company computer equipment to perform their jobs. All temporary personnel that will be using the organization's computer equipment to perform their job function must become familiar with the organization's computer security policy. The network administrator must also perform the following additional security measure:

  • Create a new account for the temporary employee. This account must have the hours of log on and log off. Do not use the guest account.

  • Include an expiration date for each temporary account. In most cases this is the date on which the employment contract expires. You can alter the date in the event that the temporary employee needs to stay on.

  • Create a group account that will include only temporary personnel. Apply necessary log-on scripts. For example, there may be a standard log-on script for permanent employees that may not apply to the temporary user.

  • Be aware that when a new user is created, he/she automatically becomes a member of the group "everyone." To prevent the temporary user from accessing certain folders that the group "everyone" has access to, apply the temporary group account to these folders.

  • Limit access to network browsing.

  • Email access with

    Requires Free Membership to View

  • SMTP addresses should be prevented, because company information can easily be sent to unauthorized sources. However you may be required to assign a SMTP email address, and if so, you should periodically submit reports on mail-server communication logs located in most firewall software to track any communication that may be a threat to the company.


Adesh Rampat has 10 years experience with network and IT administration. He is a member of the Association of Internet Professionals, the Institute for Network Professionals, and the International Webmasters Association. He has also lectured extensively on a variety of topics.

Did you like this tip? If so, (or if not) why not let us know. Send an email to us and sound off. Or visit our tips page to rate this tip, or submit one of your own.

Related book

Principles of Systems and Network Administration
Author : Mark Burgess
Publisher : John Wiley & Sons
Published : Aug 2000
Summary :
System administration is the organization and running of computer networks. This book focuses on the general principles involved in setting up configuring and maintaining computer communities.


This was first published in March 2001

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.