acceptable an acceptable use policy (aup), also known as an acceptable usage policy or fair use...

Post on 22-Dec-2015

218 Views

Category:

Documents

3 Downloads

Preview:

Click to see full reader

TRANSCRIPT

ACCEPTABLE

An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager of a network, website or large computer system that restrict the ways in which the network, website or system may be used. AUP documents are written for corporations, businesses, universities, schools, internet service providers, and website owners, often to reduce the potential for legal action that may be taken by a user, and often with little prospect of enforcement.

Wikipedia

USEPOLICY

• Jalal Hafidi• Mathew Joseph• Tolulope Oke• Denisa Teme• Li Wei

OVERVIEW

1 of 12

IntroductionObjective Roles & ResponsibilitiesPurpose/Scope of PolicyPolicy Statements

User Accounts Computing Assets Network Use Electronic Communications Data Security

EnforcementsQuestions

Introduction

2 of 12

This policy regulates the direct and indirect use of Technology resources across our organization.

Technology resources = Strategic assets Computer resources and employeesExpectations for appropriate use of these resources.

Objective

3 of 12

Standard use of technology resources across the organization

Familiarization with policyAcceptable useUnacceptable useFormal signature – binding on all employeesOriginal copy and revisions

Roles & Responsibilities

4 of 12

• Users’ Responsibility & Awareness• www.mcinc.com/policies• Technology Department• CIO & CEO• Authority & Enforcement

Purpose & Scope of Policy

5 of 12

Guidelines for protecting the CIA of MC Inc.’s dataAppropriate security requirements and restrictions on the

organization’s technology resourcesCovers all organization’s technology resources

User Accounts

6 of 12

Password security (system & user-level)Unique user accounts & accessIllegal access to other user accounts Employee responsibility

Computing Assets

7 of 12

Organization’s computer system Laptops taken outside of the organization Devices left overnightLoss & theftPassword-protected screensavers, locking screens,

& logging offExternal devicesInterference

Network Use

8 of 12

Copyright material ( illegal software, P2P, etc….)Unauthorized access (accounts, data, servers…)Sharing network passwordsEngaging in malicious activities intentionallyUsing the company’s network for personal use Getting involved in activities causing a disruption of

service (DoS for example)Obscene materials

Electronic Communications

9 of 12

Use of phone linesCompany e-mailsE-mail IDs & accountsFoul languagesForgeryNegative use of social media

Data Security

10 of 12

Proprietary information on personal or non-company approved devices

Directories, programs, files, data & documentsConfidential dataUnauthorized access & misuse to sensitive dataEncrypted folders

Enforcement

11 of 12

Violations of this Acceptable use policy may result in: Suspension or revocation of account & privilegesDisciplinary action as described in the Employees’ Code

of Conduct handbookCivil or criminal prosecution under federal and/or state

law Penalties under such laws may include fines, orders of

restitution, and imprisonment

Questions?

12 of 12Contact UsTel:123-345-7896help@mc.com

Don’t Forget:When in doubt visit www.mcinc.com/policies/aupor take a walk to the Technology department

THANK YOU

top related