ACCEPTABLE USE POLICY
Information Security Policy Number 12345
An Acceptable Use Policy (AUP) is an organization-wide policy that defines what is allowed and what is not allowed regarding use of Information Technology (IT) assets by employees. The following policy is to be followed by all employees of Richman Investments, authorized individuals, vendors, and contractors who use any information technology (IT), electronic, or communication devices owned and/or provided by Richman Investments for the purpose of assisting them with their job-related duties. Access to the Internet is a privilege and all employees must ...view middle of the document...
Any electronic files created, sent, received, or stored under the custody of Richman Investments are the property of Richman Investments and use of these files by employees is neither personal nor private. Richman Investments management has the right to monitor and/or log all employee use with or without prior notice.
C. Acceptable Use Requirements
All users must report any incidents of possible misuse or violation of this AUP. Users must not attempt to access any documents, data, email, or programs in which they are not authorized to do so. Users must report any weaknesses in computer security to the management and/or the appropriate security staff. Users must not share their account passwords, PINs, or Smartcards used for identification and authorization purposes. Users must not make any copies of copyrighted materials or Richman Investments-owned software. Users must not engage in activity that Richman Investments may consider to be indecent, obscene, offensive, or that is illegal according to any law. Users must not download, install or run security programs or utilities such as scanners or password cracking programs that exploit weaknesses in the security of Richman Investments’ computers systems. Access to the Internet from company-owned, home-based computers must follow all rules and regulations outlined for in-house computer resources. Any security issues will be reported to and followed up on by management for further investigation.
D. Incidental Use
Incidental use of email, Internet access, FAX machines,...