Knowledge Base   /   Policy

Intrusion and Hacking

Posted on 08 September 2022 08:53 am

The regulations surrounding network security are laid down in the CT Group of Institutions Network Security Policy. Users must in no way attempt to gain access to internal or external systems to which they have not been granted access. This includes browsing the network drives without authorization.

Users must take all reasonable precautions to prevent other persons from using their account to gain access to internal or external systems, which they have not explicitly been granted access.

No one is allowed to open any proxy website inside CT Group of Institutions IT Infrastructure.

No one is allowed to install any spy or unethical software to any system, laptop, tablet, phone etc. within the IT infrastructure of CT Group. No one is allowed to open any illegal website inside CT Group of Institutions IT Infrastructure. Entire internet or IT related activities are under observation by the IT team of CT Group.