acceptable an acceptable use policy (aup), also known as an acceptable usage policy or fair use...
TRANSCRIPT
ACCEPTABLE
An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager of a network, website or large computer system that restrict the ways in which the network, website or system may be used. AUP documents are written for corporations, businesses, universities, schools, internet service providers, and website owners, often to reduce the potential for legal action that may be taken by a user, and often with little prospect of enforcement.
Wikipedia
USEPOLICY
• Jalal Hafidi• Mathew Joseph• Tolulope Oke• Denisa Teme• Li Wei
OVERVIEW
1 of 12
IntroductionObjective Roles & ResponsibilitiesPurpose/Scope of PolicyPolicy Statements
User Accounts Computing Assets Network Use Electronic Communications Data Security
EnforcementsQuestions
Introduction
2 of 12
This policy regulates the direct and indirect use of Technology resources across our organization.
Technology resources = Strategic assets Computer resources and employeesExpectations for appropriate use of these resources.
Objective
3 of 12
Standard use of technology resources across the organization
Familiarization with policyAcceptable useUnacceptable useFormal signature – binding on all employeesOriginal copy and revisions
Roles & Responsibilities
4 of 12
• Users’ Responsibility & Awareness• www.mcinc.com/policies• Technology Department• CIO & CEO• Authority & Enforcement
Purpose & Scope of Policy
5 of 12
Guidelines for protecting the CIA of MC Inc.’s dataAppropriate security requirements and restrictions on the
organization’s technology resourcesCovers all organization’s technology resources
User Accounts
6 of 12
Password security (system & user-level)Unique user accounts & accessIllegal access to other user accounts Employee responsibility
Computing Assets
7 of 12
Organization’s computer system Laptops taken outside of the organization Devices left overnightLoss & theftPassword-protected screensavers, locking screens,
& logging offExternal devicesInterference
Network Use
8 of 12
Copyright material ( illegal software, P2P, etc….)Unauthorized access (accounts, data, servers…)Sharing network passwordsEngaging in malicious activities intentionallyUsing the company’s network for personal use Getting involved in activities causing a disruption of
service (DoS for example)Obscene materials
Electronic Communications
9 of 12
Use of phone linesCompany e-mailsE-mail IDs & accountsFoul languagesForgeryNegative use of social media
Data Security
10 of 12
Proprietary information on personal or non-company approved devices
Directories, programs, files, data & documentsConfidential dataUnauthorized access & misuse to sensitive dataEncrypted folders
Enforcement
11 of 12
Violations of this Acceptable use policy may result in: Suspension or revocation of account & privilegesDisciplinary action as described in the Employees’ Code
of Conduct handbookCivil or criminal prosecution under federal and/or state
law Penalties under such laws may include fines, orders of
restitution, and imprisonment
Questions?
12 of 12Contact UsTel:[email protected]
Don’t Forget:When in doubt visit www.mcinc.com/policies/aupor take a walk to the Technology department
THANK YOU