This website uses cookies to ensure you have the best experience. Learn more

Acceptable Use Policy Essay

763 words - 4 pages

Richman Investments
ACCEPTABLE USE POLICY
Information Security Policy Number 12345
Effective 10/15/2013`
I. Introduction
An Acceptable Use Policy (AUP) is an organization-wide policy that defines what is allowed and what is not allowed regarding use of Information Technology (IT) assets by employees. The following policy is to be followed by all employees of Richman Investments, authorized individuals, vendors, and contractors who use any information technology (IT), electronic, or communication devices owned and/or provided by Richman Investments for the purpose of assisting them with their job-related duties. Access to the Internet is a privilege and all employees must ...view middle of the document...

B. Ownership
Any electronic files created, sent, received, or stored under the custody of Richman Investments are the property of Richman Investments and use of these files by employees is neither personal nor private. Richman Investments management has the right to monitor and/or log all employee use with or without prior notice.
C. Acceptable Use Requirements
All users must report any incidents of possible misuse or violation of this AUP. Users must not attempt to access any documents, data, email, or programs in which they are not authorized to do so. Users must report any weaknesses in computer security to the management and/or the appropriate security staff. Users must not share their account passwords, PINs, or Smartcards used for identification and authorization purposes. Users must not make any copies of copyrighted materials or Richman Investments-owned software. Users must not engage in activity that Richman Investments may consider to be indecent, obscene, offensive, or that is illegal according to any law. Users must not download, install or run security programs or utilities such as scanners or password cracking programs that exploit weaknesses in the security of Richman Investments’ computers systems. Access to the Internet from company-owned, home-based computers must follow all rules and regulations outlined for in-house computer resources. Any security issues will be reported to and followed up on by management for further investigation.
D. Incidental Use
Incidental use of email, Internet access, FAX machines,...

Other Papers Like Acceptable Use Policy

Internet Acceptable Use Policy Essay

1702 words - 7 pages INTUSE-2014-POL INTUSE-2014-POL OMNICORP Industries 14 Internet Use Policy OMNICORP Devices Rodriguez, Jacob Isiah CTR NSWC Corona, MS41 CONT OMNICORP Industries 14 Internet Use Policy OMNICORP Devices Rodriguez, Jacob Isiah CTR NSWC Corona, MS41 CONT Change Management | Version History VERSION | NAME | CHANGES | DATE | APPROVED BY | 1.2 | Jacob Rodriguez | Modify Policy | 8/19/2014 | Jacob Rodriguez | 1.1 | Jacob

Acceptable Use Policy Essay

852 words - 4 pages Acceptable Use Policy Richman investments recognizes that the ability to use the Internet and email at work can and will increase productivity and efficiency in the workplace environment. Employees are encouraged to utilize these avenues appropriately. Unacceptable use of the internet and email can place Richman Investments and its staff at risk. The policies that are put in place regarding Internet and email usage, if followed, will ensure the

Richman Investments Acceptable Internet Use Policy

529 words - 3 pages Richman Investments Acceptable Internet Use Policy Use of the Internet by employees of Richman Investments is permitted and encouraged where such use supports the goals and objectives of the business. However, Richman Investments has a policy for the use of the Internet whereby employees must ensure that they: • comply with current legislation • use the Internet in an acceptable way • do not create unnecessary business risk to the company

Itt It255 Unit 4 Aup

1345 words - 6 pages Richman Investments assets. This Acceptable Use Policy in conjunction with the corresponding standards is established to achieve the following: 1. To establish appropriate and acceptable practices regarding the use of information resources. 2. To ensure compliance with applicable State law and other rules and regulations regarding the management of information resources. 3. To educate individuals who may use information resources

Is4550 Week 5 Lab

1642 words - 7 pages Policy Framework Definition Overview Given the following IT security policy framework definition, specify which policy probably can cover the identified risk, threat, or vulnerability. If there is none, then identify that as a gap. Insert your recommendation for an IT security policy that can eliminate the gap. Risk – Threat – Vulnerability | IT Security Policy Definition | Unauthorized access from pubic Internet | Acceptable use

Nt2580 Unit 4 Assignment 2

706 words - 3 pages Dallas Page July 17, 2015 Unit 4 Assignment 2 NT2580 Acceptable Use Policy Definition 1. Overview To protect the integrity, confidentiality and accessibility along with the safety of our clientele and employees it is necessary that a precise set of standards must be defined for anyone who utilizes the electronic devices to access information via the internet. Richman Investments is committed to protecting employees, partners and

Unit 4 Assignment 1: Enhance an Existing It Security Policy Framework

698 words - 3 pages employee bears responsibility for the consequences should the access is misused. Please review the following policies for details of protecting information when accessing the corporate network via remote access methods, and acceptable use of Richman Investment's network:  Acceptable Encryption Policy  Wireless Communications Policy  Acceptable Use Policy For additional information regarding Richman Investment's remote access

Intro To Comuter Security 3

353 words - 2 pages care are just the standards. 15. Policy is guidelines that describe acceptable and unacceptable employee behaviors in the workplace. The difference between policy and law is that ignorance of a policy is an acceptable defense. 16. Software license infringement, illicit use, and misuse of corporation resources 17. Education and training, and technology to protect information and systems. 18. The Association of Computing Machinery was established in 1947 19. Information Systems Audit and Control Association 20. Fear of penalty, probability of being caught, and probability of penalty of being administered

Authorize User Policy

1495 words - 6 pages Example Acceptable Use Policy for IT Systems Using this policy One of the challenges facing organizations today is enabling employees to work productively while also ensuring the security of the IT network and, crucially, the data on it. Given that technology is continually changing, employees play a significant role in IT security. This policy provides a framework for users to follow when accessing IT systems and the data on them. It is

Title Is Awesome

1179 words - 5 pages primer, in your Lab Report document,describe the basic requirements of policies, their benefits, the control factors, and policies every organization needs. 12. Review the identified risks, threats, and vulnerabilities in the table in step 8, and then select an appropriate policy definition that might help mitigate each of them. You can select one of the SANS policies or choose one from the following list:      Acceptable Use Policy

Procedural Message – Draft Version

592 words - 3 pages Attention: This notice is a reminder of company policy on acceptable use of email and text messaging. As the company continues to grow there is a need to refresh you on the Company acceptable use policy. The reason for this policy is to ensure the appropriate use of email and text messaging so that all employees is mindful of what’s considered as satisfactory and unsatisfactory to the company. However, this guideline is a road map and guide of

Related Essays

Acceptable Use Policy Essay

596 words - 3 pages Acceptable Use Policy or AUP is a written policy and an agreement that defines what is allowed and not allowed to be used by employees regarding the use of internet. Here at Richman Investment are giving you, the employees the details and what the policy entails. The use of the Internet is a privilege, not a right, and inappropriate use will result in a cancellation of those privileges. The purpose of the internet resources is to help

Acceptable Use Policy Essay

624 words - 3 pages technology protection measures. Websites that are obscene, contain child pornography, or are harmful to minors must be either blocked or filtered. The policy that schools use is The Acceptable Use Policy (AUP). The Acceptable Use Policy outlines rules regarding internet use so that the students, and staff, are protected. It must address a number of issues including personal safety, illegal activities, system security, privacy, plagiarism

Ict Acceptable Use Policy Essay

1398 words - 6 pages ICT ACCEPTABLE USE POLICY JUNIOR SCHOOL 2011 P- 2 Student Acceptable Use Policy Being an Academic, Caring and Christian Digital Citizen: In our school we use information and technology in safe, legal, and responsible ways. We embrace the following aspects of being a digital citizen. Safety: 1. Only go online when my parents or an adult know where I am going and can supervise me. 2. Not talk to strangers on-line because of “stranger

Acceptable Use Policy Essay 538 Words

538 words - 3 pages Acceptable Use Policy This written agreement outlining the terms and conditions of Internet usage, including rules of online behavior and access privileges. Because of the possible misuse of companies -wide computer networks and the Internet by employees having access privileges, Richman Investments are particularly concerned about having a well-developed AUP in place, which is then signed by the all employees and members of Management