Acceptable Use Policy

In: Computers and Technology

Submitted By ddewar
Words 487
Pages 2
This memo will outline the guidelines for suitable use of the internet and e-mail access. The internet usage is allowed and supported when necessary for work functions in relations to the business. Employees must ensure that they:
A. Comply with current legislation.
B. Use the internet in an agreeable way.
C. Do not create risks for the computer by misuse of the internet.
Unacceptable behavior is any activity that has been deemed as unacceptable use of the internet by employees. This includes:
A. Visiting internet sites that contain obscene, hateful, pornographic or otherwise illegal material.
B. Using the computer to perpetrate any form of fraud, or software, film or music piracy.
C. Using the internet to send offensive or harassing material to other users.
D. Downloading commercial software or any copyrighted materials belonging to third parties, unless this download is permitted under a commercial agreement or other such license.
E. Hacking into unauthorized areas
F. Publishing defamatory and/or knowingly false material about Richman Investments, your colleagues and/or our customers on social networking sites, blogs, wikis, and any other online publishing format.
G. Revealing confidential information about Reichman Investments, in a personal online posting, upload or transmission, including financial information and information relating to our customers, business plains, policies, staff and/or internal discussions.
H. Undertaking deliberate activities that waste staff effort or networked resources.
I. Introducing any form of malicious software into the corporate network.

Third Party Sites
Any business-related documentation, software, or other form of data produced during the course of work, remains the sole property of Richman Investments. This includes, but is not limited to, information stored on third-party websites such as webmail service…...

Similar Documents

Acceptable Use Policy

...Acceptable Use Policy This written agreement outlining the terms and conditions of Internet usage, including rules of online behavior and access privileges. Because of the possible misuse of companies -wide computer networks and the Internet by employees having access privileges, Richman Investments are particularly concerned about having a well-developed AUP in place, which is then signed by the all employees and members of Management. Software Access Procedure Software needed, in addition to the Microsoft Office suite of products, must be authorized by your supervisor and downloaded by the IT department. If you need access to software, not currently on the Company network, talk with your supervisor and consult with the IT department. Internet Usage Internet use, on Company time, is authorized to conduct Company business only. Internet use brings the possibility of breaches to the security of confidential Company information. Internet use also creates the possibility of contamination to our system via viruses or spyware. Spyware allows unauthorized people, outside the Company, potential access to Company passwords and other confidential information. Removing such programs from the Company network requires IT staff to invest time and attention that is better devoted to progress. For this reason, and to assure the use of work time appropriately for work, we ask staff members to limit Internet use. Additionally, under no circumstances may Company computers or other......

Words: 523 - Pages: 3

Acceptable Use Policy

...allowed and supported when necessary for work functions in relations to the business. However, Richman Investments has a policy for the use of the internet whereby employees must ensure that they: A) Comply with current legislation B) Use the internet in an acceptable way C) Do not create risks for the computer by misusing the internet. Unacceptable behavior The following has been deemed as unacceptable use of the internet by employees. A) Visiting internet sites that contain obscene, hateful, porographic or otherwise illegal meterial. B) Using the computer to perpetrate any form of fraud, or software, film, or music piracy. C)Using the internet to send offensive or harassing material to other users. D) Downloading commercial software or any copyrighted materials belonging to third parties, unless this download is coverted or permitted under a commercial agreement or other such license. E) Hacking into unauthorised areas. F) Publishing defamatory and/or knowingly false material about Richman Investments, your colleagues and/or our customers on social networking sites, ‘blogs’, ‘wikis’ and any other online publishing format. G) Revealing confidential information about Richman Investments, in a personal online posting, upload or transmission 0 including financial information and information relating to our customers, business plans, policies, staff and/pr internal discussions. H) Undertaking deliberate activities that waste staff effort or networked......

Words: 291 - Pages: 2

Acceptable Use Policy

...InfoSec Acceptable Use Policy Created by or for the SANS Institute. Feel free to modify or use for your organization. If you have a policy to contribute, please send e-mail to 1.0 Overview InfoSec’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to ’s established culture of openness, trust and integrity. InfoSec is committed to protecting 's employees, partners and the company from illegal or damaging actions by individuals, either knowingly or unknowingly. Internet/Intranet/Extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, WWW browsing, and FTP, are the property of . These systems are to be used for business purposes in serving the interests of the company, and of our clients and customers in the course of normal operations. Please review Human Resources policies for further details. Effective security is a team effort involving the participation and support of every employee and affiliate who deals with information and/or information systems. It is the responsibility of every computer user to know these guidelines, and to conduct their activities accordingly. 2.0 Purpose The purpose of this policy is to outline the acceptable use of computer equipment at . These rules are in place to protect the employee and . Inappropriate use exposes to risks including virus attacks, compromise of network......

Words: 1749 - Pages: 7

Acceptable Use Policy Definition

...Acceptable Use Policy (AUP) Definition After research and careful consideration of some of the other policies listed by other companies such as AT&T, Sprint, T-Mobile, and Verizon Wireless, Richman Investments has come up with the an acceptable use policy (AUP). The following are not allowed at any time: Making of unauthorized promises in e-mail. All emails should have a footer which states that the messages are from the sender only and do not represent the decisions or policies of Richman Investments. Using company resources or web services to visit web sites which contain inappropriate material is prohibited. This includes pornography, sexually oriented material, or sites which promote or depict discrimination, violence, or illegal activities. In addition, it is no longer allowed to have big attachments to multiple recipients in the organization will be enforced. This can tie up the system during a busy point in the day which could end up keeping the company from making profitable decisions. In addition, no jokes or humorous items on Richman Investments email system. These emails may not be considered funny to some, therefore will not be allowed by any. Making statements concerning race, sexual orientation, disability, religion, or national origin are prohibited. These statements could be seen as harassment by either the person receiving it or by other people that may see it. Use of company email to support inappropriate activities is not allowed. Checking a......

Words: 324 - Pages: 2

Acceptable Use Policy

...Acceptable Use Policy (AUP) The three companies I compared policies with were; SANS, Sopho, and Pinterest. In regards to SANS institute and Sopho they were alike in several ways first of all the AUP was from a employee / company comparison, such as not sharing id's, passwords, company's copyright information etc…They also shared Pirated software not licensed by the company is prohibited. My third choice Pinterest is more of a social site and some of the policies are different because even though your accessing the companies site to post images, opinions etc…they still have AUP in place to restrict users from posting pornographic images, creates a risk of harm, loss, physical or mental injury, emotional distress, death, disability, disfigurement, or physical or mental illness to yourself, to any other person, or to any animal. Researching different companies policies gave me a broader understanding on how to tailor the AUP to better suit the company, in other words they are not all the same. You need to create on a case by case bases. My AUP definition for Richman Investments Acceptable Use and Unacceptable use are as follows; The following activities are, in general, prohibited. Employees may be exempted from these restrictions during the course of their legitimate job responsibilities (e.g., systems administration staff may have a need to disable the network access of a host if that host is disrupting production services). Richman......

Words: 619 - Pages: 3

Acceptable Use Policy

...union: Acceptable Use Policy 1. Purpose The purpose of this policy details the acceptable and unacceptable use of ABC Credit Union devices and services for the purposes of employee protection from viruses as well as company protection from compromised data and other legal allocations. 2. Scope This policy applies to all employees, partnered businesses, and any other persons or organizations that utilize equipment and services owned or leased by ABC Credit Union. 3. Policy 3.1 General Use and Ownership Users must be aware that any data created or stored on ABC Credit Union systems and because of this Administration cannot be held responsible for data confidentiality found on any device belonging to ABC Credit Union. All ABC Credit Union employees are responsible for exercising what constitutes “Acceptable Use” of workstations and their applications as well as any attached network devices i.e. Printers, Telephony, ect. Guidelines for this policy will be created by individual departments, however any questions regarding policy adherence must be brought to the respective departmental managers. All internal data will adhere to an encryption policy per ABC Credit Union IT. For guidelines on this policy, please consult our Information Sensitivity Policy. Internal network traffic will be monitored by ABC Credit Union IT per Audit Policy ABC Credit Union reserves the right to audit their enterprise on a periodic basis to ensure compliance with this......

Words: 748 - Pages: 3

Acceptable Use Policy

...Richman Investments ACCEPTABLE USE POLICY Information Security Policy Number 12345 Effective 10/15/2013` I. Introduction An Acceptable Use Policy (AUP) is an organization-wide policy that defines what is allowed and what is not allowed regarding use of Information Technology (IT) assets by employees. The following policy is to be followed by all employees of Richman Investments, authorized individuals, vendors, and contractors who use any information technology (IT), electronic, or communication devices owned and/or provided by Richman Investments for the purpose of assisting them with their job-related duties. Access to the Internet is a privilege and all employees must adhere to the policies regarding computer, email, and Internet usage. Violation of these policies will result in disciplinary and/or legal action that may include counseling, revocation of company devices, termination of the employee, and legal action. II. Roles and Responsibilities Every employee must acknowledge that they have received a copy of the AUP and confirm that they have a complete understanding and agree to abide by the rules set forth in the AUP. Receipt and signing of the AUP will occur at Employee Orientation, and in the event of changes to the policy, a revised AUP must be signed. III. Policy Directives A. Acceptable Use Management Requirements A Standard Operating Procedure (SOP) will be established to support the development and maintenance of this AUP. ...

Words: 747 - Pages: 3

Acceptable Internet Use Policies

...Necessity of an Acceptable Internet Use Policy for Business William E. Boyle Point Park University Abstract This paper will argue that an Acceptable Internet Use Policy, combined with effective network monitoring and policy enforcement is an essential requirement for businesses to protect business assets and resources. It discusses the potential loss to business from employee misuse of internet access and the danger from external sources. Necessity of an Acceptable Internet Use Policy for Business The internet is an integral part of today’s business resources. Organizations, large and small use the internet to improve organizational efficiencies. Businesses use the internet for everything from worldwide sales using websites, workforce collaboration using email and network data access, and for business research. In most business organizations, all types of devices, from desktop computers to cell phones and PDA’s, allow workers to access the internet and send and receive email on demand. A 2008 study by the Pew Internet & American Life Project found that 53% of Americans are employed, and 96% of these workers have some access to these tools. (Madden, M. & Jones, S., 2008). This allows workers instant access to websites, email and instant messages, but uncontrolled access exposes a business organization to a great risk of financial loss. All businesses must manage this risk through the implementation of an Internet Use Policy combined with employee......

Words: 2537 - Pages: 11

Acceptable Use Policy

...person who uses a power tool without reading safety guidelines first takes a chance of getting hurt. Although using the Internet may not be physically harmful there still needs to be a set of safety guidelines to adhere to. In 2000 Congress enacted The Children’s Internet Protection Act (CIPA) to address this safety. CIPA imposes that all schools and libraries that receive Internet services at a discounted rate follow certain guidelines to help keep students safe while online. In order to continue receiving the discounted rate schools and libraries must certify that they have an Internet safety policy that includes technology protection measures. Websites that are obscene, contain child pornography, or are harmful to minors must be either blocked or filtered. The policy that schools use is The Acceptable Use Policy (AUP). The Acceptable Use Policy outlines rules regarding internet use so that the students, and staff, are protected. It must address a number of issues including personal safety, illegal activities, system security, privacy, plagiarism, copyright infringement and access to inappropriate materials. In addition, it should make it clear to the student that the school’s technology property is to be used for educational purposes only. Student’s rights, such as free speech, and access to information, should be outlined in the document, as should the consequences for violating the Acceptable Use Policy. Teachers need to discuss the Acceptable Use Policy......

Words: 601 - Pages: 3

Acceptable Use Policy Breakdown

...description and scope of the contents of the policy. #Acceptable Use Policy This policy is used to establish a culture of trust and integrity amongst the employees and users of the network. The acceptable use policy should contain an overview, purpose, scope, general use & ownership and un-acceptable use sub-sections. Email Policy The policy defines standards for conducting communications within the corperate network email system. These standards minimize the potential exposure to the company from unsolicited email messages and attachments. The email policy should contain a purpose and enforcement sub-sections. Anti-Virus Policy The policy defines standards for protecting the company’s network from any threat related to maleware Identity Policy The policy defines rules and practices for protecting the corporate network from unauthorized access. The Identity policy identifies who each user is and what resources they are allowed to access. The identity policy should contain sub-sections on purpose, employee training, visitors (i.e.temps, contractors and consultants,) and prohibited practices. Password Policy Passwords are an important aspect of netwok security. They are the front line of protection for user accounts. The password policy should contain sub-sections on purpose, scope, policies, guidelines and enforcement. Encryption Policy This policy provides guidance so that encryption efforts will use only those algorithms that have received......

Words: 476 - Pages: 2

Define an Acceptable Use Policy

...1.0 Introduction Richman Investments at all times is to establish acceptable and unacceptable use of electronic devices and network resources. All employees of Richman Investments must comply with the rules and regulations for use of the Internet, sending e-mail, entering to social media sites, and downloading attachments from internet. The Richman Investments AUP will help achieve these goals. 2.0 Scope Every supervisor, employee and temporary employee that works for Richman Investments must follow this policy as it is written. This policy also applies to all equipment affiliated with Richman Investments. 3.0 Policy 3.1 General As an employee of Richman Investments, you are responsible for the internet access. In ordnance with the policies set forth by Richman Investments resources may not be used for any unlawful or prohibited purpose. For extra security Richman Investments will monitor all systems, equipment, and network using the Audit Policy. Any devices that might interfere with the Richman Investments network will be immediately disconnected. Firewalls must be turn on at all times. Antivirus programs must be updated regularly. 3.2 Security 1. Every device connected to the Richman Investments network must comply with the Access Control Policy. All hard drives must be encrypted. 2. All employees of Richman Investments must keep their passwords secure and do not share accounts. Authorized users are responsible for the security of their...

Words: 620 - Pages: 3

Internet Acceptable Use Policy

...Industries 14 Internet Use Policy OMNICORP Devices Rodriguez, Jacob Isiah CTR NSWC Corona, MS41 CONT OMNICORP Industries 14 Internet Use Policy OMNICORP Devices Rodriguez, Jacob Isiah CTR NSWC Corona, MS41 CONT Change Management | Version History VERSION | NAME | CHANGES | DATE | APPROVED BY | 1.2 | Jacob Rodriguez | Modify Policy | 8/19/2014 | Jacob Rodriguez | 1.1 | Jacob Rodriguez | Extend and refine the policy | 7/25/2014 | Jacob Rodriguez | 1.0 | Jacob Rodriguez | Creation | 7/1/2014 | Jacob Rodriguez | Introduction OMNICORP makes internet access available to its employees where relevant and useful for their jobs. It is unfortunate that the internet can be so great but yet so risky. Accordingly, this policy shall be categorized as “Highly Important”. This will ensure the proper individuals and systems follow the policy. This internet use policy describes the rules governing internet use at the company. It also sets out how staff members are expected to behave when using the internet. As OMNICORP grows their products and services so shall this policy implementation and structure. This policy should be read alongside other key policies. The company’s Data protection and email policies are particularly relevant to staff who use the internet Purpose The internet is a powerful tool that can bring significant benefits to OMNICORP. However, it’s important every person at the company who uses the internet understands how to use it......

Words: 1678 - Pages: 7

Acceptable Use Policy

...Assignment: Create an Internet and Email Acceptable Use Policy Course Foundations of Computer security Instructor: Amanda Lawrence Cooley Investments is an organization based upon client trust and confidentially. Without the trust placed in the organization by the clients, the organization will cease to exist. As such, every employee should consider their daily actions and the correlation of those actions to the trust placed in the company by the clients. Just as “Employee Smith” would safeguard his home computer against a malware attack, so should he protect the company’s computer from a malware attack. The following will outline the acceptable use of Cooley’s assets regarding Internet and email access and the actions that are prohibited. Cooley Investment’s computers, computer files, e-mail system, Internet access and any software furnished to employees are company property and subject to monitoring and unannounced review. They are to be used for company business only, and not for excessive personal use to communicate with friends or family or to access the Internet for personal purposes. While use of the computer, e-mail and Internet is intended for job-related activities, incidental and occasional brief personal use is permitted within reasonable limits so long as it does not interfere with the employee's work. The company specifically prohibits the use of computers (including Internet access) and the e-mail system in ways that are disruptive, offensive......

Words: 805 - Pages: 4

Acceptable Use Policy

...Acceptable Use Policy Richman investments recognizes that the ability to use the Internet and email at work can and will increase productivity and efficiency in the workplace environment. Employees are encouraged to utilize these avenues appropriately. Unacceptable use of the internet and email can place Richman Investments and its staff at risk. The policies that are put in place regarding Internet and email usage, if followed, will ensure the security the data that our clients trust us to store.   Internet and Email Usage Policies: * Richman Investment employees are expected to use the Internet responsibly and productively. Internet access is limited to job-related activities only and personal use is not permitted. * Job-related activities include research and educational tasks that may be found via the Internet that would help in an employee's role. * All Internet data that is composed, transmitted and/or received by Richman Investment computer systems is considered to belong to Richman Investment and is recognized as part of its official data. It is therefore subject to disclosure for legal reasons or to other appropriate third parties. * The equipment, services and technology used to access the Internet are the property of Richman Investment and the company reserves the right to monitor Internet traffic and monitor and access data that is composed, sent or received through its online connections. * Emails sent via the company email system should......

Words: 833 - Pages: 4

Acceptable Use Policy

...Acceptable Use of Computers and Networks For Richman Investments   I. Introduction Richman Investments’ commitment to great customer service and longevity has always been its legacy. Therefore Richman’s need, to be as secure as possible, is vital. Computers, computing systems, and networks owned by Richman Investment must be secure. All Employees that access any of these resources must comply with specific policies and guidelines stated in this policy. II. Scope This policy applies to all users Richman Investments’ computing and network resources, locally or remotely. III. Policy Statement Employees using the network resources belonging Richman Investment must act in compliance with the policies of this company in regards to using a shared resource. IV. Acceptable Use Guidelines Richman’s Acceptable Use Policy for computers and networks: Employees are responsible for passwords and other security identities. Employee cannot gives access to information to unauthorized personnel. Password must be kept in a secure place and out of view. Employees must use proper security measures to protect information, data, and systems of Richman Investment. Users must protect their computer systems and accounts by using strong passwords, installing anti-virus software specified by the network administration. Unauthorized use of internet, email, and social network site are forbidden. Employees cannot use computers to send, post, or display malicious or offensive messages, text,......

Words: 279 - Pages: 2

The New Tango Orquesta - The New Tango Orquesta | Biography | Question Time