Web Proxy

Created by Danny Wong, Modified on Sat, 19 Jun 2021 at 06:27 PM by Danny Wong

Policy Statement

Business has implemented a Web proxy on the campus network. The Web proxy is an integral component of Business's network security program, sitting in between the user and the Internet (see diagram below). When a user requests Web resources (such as a Web site) from inside the WCMC network, the proxy will evaluate the request and respond according to its filtering rules.



By using a Web proxy to act as an intermediary between the user and the Internet, users will benefit from security features that protect them from harmful Web content while continuing to experience a high level of network performance and access to required resources.


A Web proxy has the ability to perform the following services:


  1. Filter Web content and block access to malicious Web sites
  2. Scan transmitted content for malware or other harmful material
  3. Inspect and intercept certain network traffic to prevent data loss
  4. Increase network performance by caching (storing) commonly-used resources

The Web proxy is designed to provide these services without negatively affecting network performance and user experience.


Reason for Policy

The Web proxy is being used in conjunction with other Business security tools to protect confidential data. The purpose of this policy document is to provide an overview of the Web proxy on the Business network, and to educate users on the proxy's features and benefits.


Who Should Read this Policy

All users of Business.


Principles

Business Users should not expect that personal communications will remain private and/or confidential. While the business permits generally unhindered use of its information technology resources, those who use Business information technology resources do not acquire, and should not expect, a right of privacy.


Procedures

The Web proxy is currently monitoring network traffic on select areas of the campus network. Business Users should not notice any significant change in their network performance, and should continue to abide by existing policies for appropriate use of ITS resources as provided in the ITS polices page.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select atleast one of the reasons

Feedback sent

We appreciate your effort and will try to fix the article