Premium Essay

Internet Usage Policy

In:

Submitted By diljith1092
Words 833
Pages 4
Employee Internet Use Monitoring and Filtering Policy
Created by or for the SANS Institute. Feel free to modify or use for your organization. If you have a policy to contribute, please send e-mail to stephen@sans.edu
1.0 Purpose
The purpose of this policy is to define standards for systems that monitor and limit web use from any host within 's network. These standards are designed to ensure employees use the Internet in a safe and responsible manner, and ensure that employee web use can be monitored or researched during an incident. 2.0 Scope
This policy applies to all employees, contractors, vendors and agents with a -owned or personally-owned computer or workstation connected to the network.
This policy applies to all end user initiated communications between ’s network and the
Internet, including web browsing, instant messaging, file transfer, file sharing, and other standard and proprietary protocols. Server to Server communications, such as SMTP traffic, backups, automated data transfers or database communications are excluded from this policy.
3.0 Policy
3.1 Web Site Monitoring
The Information Technology Department shall monitor Internet use from all computers and devices connected to the corporate network. For all traffic the monitoring system must record the source IP
Address, the date, the time, the protocol, and the destination site or server. Where possible, the system should record the User ID of the person or account initiating the traffic. Internet Use records must be preserved for 180 days.
3.2 Access to Web Site Monitoring Reports
General trending and activity reports will be made available to any employee as needed upon request to the
Information Technology Department. Computer Security Incident Response Team (CSIRT) members may access all reports and data if necessary to respond to a security incident. Internet Use reports

Similar Documents

Premium Essay

Sony

...Facebook: It’s about the money 1) Facebook faces controversy over the handling and usage of the extensive information it collects from its users. FB user’s biggest concerns are the privacy and user controls over the information granted to Facebook. Facebook faces the dilemma of how to gain revenues from user information without violating their privacy. The management and organization failed to consider its users privacy concern when it introduced new software that users felt to be invasive. Facebook provides a free service that users pay for, in effect, by providing details about their lives, friendships, interests and activities. Facebook, in turn, uses that information to attract advertisers, app makers and other business opportunities. Facebook occasionally isn't enforcing its own rules on data privacy. Facebook requires apps to ask permission before accessing a user's personal details. However, a user's friends aren't notified if information about them is used by a friend's app. Facebook provides people a specific social networking platform and facilitates contents sharing and communication. It targets global internet users, advertisers, and also application developers. Facebook partners with different parties in the functionality, application developing, and advertisers for enabling various features to meet users’ different social needs. To give better services to right customers, Facebook exploits and analyzes customer information, shares info with third party and...

Words: 805 - Pages: 4

Free Essay

Progress with Technology: Do More with Less

...Advancements in collecting information, spending cost, and daily incoming data is ever growing. Moving forward in business needs can and will grow your company. As the world evolves in many aspects of life, the needs of a company’s evolution are also a part of those changes. We once rode in horse and buggies and using that horsepower, developed into a much faster more efficient way of travel. Stepping into the technological world of business will also create that for your work environment. The components of the system that you recommend including input devices, output devices, and storage. There are multiple components to a system that allows you to get the best use of your computer. Common daily uses of mail, iCal and contacts are interchangeable between your Mac and PC. The compatibility of the Mac allows you to open most files from software that a PC uses. There are a number of input devices that can be useful to enhance your technology. The use of trackballs, multiple mouse options to suit the needs of the user, and scanners that will allow you to digitally store forms and paperwork. Sending these to different departments for their use decreases the need for paper and reduces storage room for paper files. Planning for the storage of these files is important. A structure for backing up information or data is a must and can benefit for a quick reference no matter the date of the file. Organizing the process is critical at the start of the implementation. Having...

Words: 2426 - Pages: 10

Premium Essay

Human Resources Risk

...An internet usage policy provides employees with rules and guidelines about the appropriate use of company equipment, network and Internet access. Having such a policy in place helps to protect both the business and the employee; the employee will be aware that browsing certain sites or downloading files is prohibited and that the policy must be adhered to or there could be serious repercussions, thus leading to fewer security risks for the business as a result of employee negligence. The Internet Usage Policy is an important document that must be signed by all employees upon starting work. Below is a Sample Internet Usage Policy that covers the main points of contention dealing with Internet and computer usage. The policy can then be tailored to the requirements of the specific organization. Internet usage policy This Sample Internet Usage Policy applies to all employees of <company> who have access to computers and the Internet to be used in the performance of their work. Use of the Internet by employees of <company> is permitted and encouraged where such use supports the goals and objectives of the business. However, access to the Internet through <company> is a privilege and all employees must adhere to the policies concerning Computer, Email and Internet usage. Violation of these policies could result in disciplinary and/or legal action leading up to and including termination of employment. Employees may also be held personally liable for damages caused...

Words: 975 - Pages: 4

Free Essay

Employee Privacy Report

...Computers use, Internet, e-mail, and company Privacy Policies at O & R Fashion Inc. O& R Fashion Incorporated implemented new regulations to its current company privacy policy to regulate and monitor its employees’ e-mail and internet practices. The Internet use, electronic mail, and employee privacy policies needed to be reevaluated so employees can comply with company formal policies, regulations, procedures and because in the past our company’s managerial staff experienced many unresolved issues with employees due to their uncertainty to how to implement our policies. As a result O & R Fashion Incorporated with the association of its HR services developed an updated policy manual to monitor emails, and Internet access, however; providing the appropriate balance between company’s rights and employee’s privacy rights. The new changes and implementations to our existing privacy policies will reduce or even avoid misunderstandings or any similar situations in the future. This report was completed to explain the new implementations regarding emails usage, and Internet practices within our company and the reasons why O & R Fashion Incorporated decided to implement them. This report will also address some of the employees’ assumptions regarding such policies, how employees are affected by these new changes, and employees’ rights as well as current regulating federal and state laws regarding electronic mail and Internet use. Employees Accessing the Internet After conducting...

Words: 1432 - Pages: 6

Free Essay

Personal Use of Company Resources

...for personal usage. Considering all the time that people spend at a desk it is almost inevitable that this will happen. The important thing is to make sure that the usage is not abusive nor against company policy. Research suggests that people either very diligent about excessive usage or very abusive of company policies. The line between the two can be a very fine one but determining what constitutes excessive will always seem to be controversial. Personal Use of Company Resources Everyone at some point has used company resources for personal use whether it is office supplies, copiers/printers or computers. In today’s society people spend more time at work then they do at home with their families. There just does not seem to be enough time at home to handle all the things that need to be done at home and that is why employees use company resources for their personal business. How does an employer determine what is excessive and is considered abuse? There are some organizations out there that allow their employees limited use of company resources as long as it does not impact their jobs or the actual network resources. There are other companies out there that have very strict policies to prevent certain types of personal usage to the point that they do not allow any internet access at all. These types of policies depend solely on the company or organization due partly to cost but also to past history of usage from employees. For example NASA’s policy seems to be...

Words: 1144 - Pages: 5

Free Essay

Business

...Should Employees Be Allowed to Surf the Internet during Work Time? Linge Li 315668 Case, C., & Young, K. (August 01, 2002). Employee Internet Management: Current Business Practices and Outcomes. Cyberpsychology & Behavior, 5, 4, 355-361. This paper explored the current practices to reduce or control the Internet misuse or abuse in organizations and analyzed the data collected from a wide range of respondents, as well as the related areas in the organizations that participated in this study. The authors also provided the Internet E-Management Framework to help analyze employees’ behavior, which concluded several behaviors and aspects that are mostly concerned in organizations. The results and implications of this study contribute to understand companies’ awareness, concerns, and practices on Internet misuse issues. Firms Control Employee Internet Use. (July 01, 2007). Information Management Journal, 41, 4. This article provides data regarding why companies restrict their employees’ Internet access. Therefore it is helpful to understand the attitude towards Internet usage issue from the employer’s side. Akman, I., & Mishra, A. (July 21, 2010). Predictive Effect of Gender and Sector Differences on Internet Usage among Employees. Engineering Economics, 21, 3, 295-305. This paper recognizes the increasing usage of Internet in organizations and the need from policy makers to understand their employees’ Internet usage patterns and purposes. The authors concluded...

Words: 671 - Pages: 3

Premium Essay

Acceptable Use Policy

...Acceptable Use Policy or AUP is a written policy and an agreement that defines what is allowed and not allowed to be used by employees regarding the use of internet. Here at Richman Investment are giving you, the employees the details and what the policy entails. The use of the Internet is a privilege, not a right, and inappropriate use will result in a cancellation of those privileges. The purpose of the internet resources is to help employees in the performance of their job related functions and not for personal usage. Each employee that is given privileges will have to comply with the company’s policy. Internet usage should be conducted for the company business only. Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information. The use of personal internet must be limited and only to be used for web based emails only with the approval of your Supervisor or Manager. Under no circumstances may Company network to be used on Social networking such as Facebook, or video viewing such as you tube, pornographic, or any unethical use. These websites will be restricted and prohibited for viewing. Doing so can lead to disciplinary action up to and including termination of employment. Like the internet, email should also be for Company purposes only. Any employees are not allowed to send personal emails using Company email...

Words: 576 - Pages: 3

Premium Essay

Internet Usage Torts

...XYZ Corporation’s business environment has changed dramatically over the years, especially the manner in which your company can be held liable, or accountable for the actions of your employees. Many small and big businesses like your company have numerous methods to protect themselves from lawsuits in the area of criminal activity and workplace torts. With proper training programs and a comprehensive set of electronic communications policies in place, companies such as yours can reduce many of the criminal and workplace torts that could occur within your workplace or business location and reduce the risk and occurrence of lawsuits and liabilities associated with the improper and illegal usage of the company resources such as Internet usage, email, and use of the company Network and computing systems. Many of the torts that typically occur outside of the workplace can easily occur within the workplace environment because of improper employee use, misuse, or illegal use of the Internet, social media, and email provided by companies such as XYZ Corp. A brief summary of the workplace torts that can create corporate liability and from which corporations and business owners must protect themselves from include but are not limited to: 1. Intentional torts (torts against a person): Assault, Battery, False Imprisonment, and Intentional infliction of emotional distress. 2. Property Torts such as Conversion and Copyright Infringement. 3. Dignitary torts activity that causes injury...

Words: 2924 - Pages: 12

Free Essay

Test

...Acceptable IT Usage Policy Acceptable IT Usage Policy Capgemini India The information contained within this document is the property of CAPGEMINI INDIA and is issued in confidence and must not be reproduced in whole or in part. Acceptable IT Usage Policy Document Control Revision History Date Version 8th June 2004 ISMS-Annex04/1.0 1.1 Author C. Rai – ISMS Manager C. Rai – ISMS Manager Description FIRST RELEASE Second Release – Revision of earlier release to adapt QMS guidelines on document controls and classification standard Control 3.9 – “network” was replaced with “network server” Addition of control 3.19 “Network access to temporary staff and visitors” under section 3 Addition of SECTION 8 “Mobile computing and Teleworking Policy” SECOND RELEASE Changes in software copyright compliance, Internet policy, maintaining information security, password policy. THIRD RELEASE Addition of acceptable use policy on Data Card / GPRS / Blackberry 15th Jan 05 28th Jan 05 1.2 C. Rai – ISMS Manager 12th Feb 05 1.3 CRAI – ISMS Manager 3rd March 05 2.0 CRAI – ISMS Manager Chandrashekhar Moharir – ISMS Team 27th September 2.1 05 4th Oct 06 18th 08 3.0 Cmoharir- ISMS team Dmalli- ISMS Team September 3.1 19th September 3.1 09 22nd April 2010 3.2 Company Confidential Kamal Seepana- ISMS No changes Team Daksha Malli Policy Revision Page 2 of 20 Printed copies are current on distribution date. Always refer to the electronic...

Words: 5081 - Pages: 21

Premium Essay

Employee Privacy Report

...Employee Privacy Report Introduction Using e-mail, the Internet, and privacy policies at an organization is partially what an employee does daily. Properly using the Internet, e-mail and privacy policies is the responsibility of each staff member. Although staff used e-mails to communicate with employees as well as research the Internet for information related to the job, one would expect for certain information to remain private; however, it does not occur like this all the time. Businesses have in place policies where they have the right to observed employees activities during job. While it is important for employees to be mindful of their companies’ policies, it is more important to know that employers have the responsibility to ensure that their employees have been properly inform and made aware of these policies. When an employer provide an employee with a copy of the companies handbooks, the handbook should address such issues as electronic communication and Internet use while on company computers. Additionally, most companies policies states, whether “internet use and communication … are considered part of the company’s business” and “such communication are not to be considered private or personal to any individual employee.” However, some company’s policy also provides, that “occasional personal use is permitted” (Gavejian). What are the e-mail use, Internet use, and privacy policies at your job? Law allows employing organizations to monitor business...

Words: 1297 - Pages: 6

Premium Essay

The Transitioning Workplace

...Name: Course: UNV 104 Date: Instructor: The Transitioning Workplace Today the internet is always virtually at a person’s fingertips and constantly advancing shifting society socially, culturally, and economically. Internet in the workplace has become the next step in a trend of naturalized technology advancement much like the car, television, and cell phones (International Journal of Management & Marketing Research, 2013). Adjustments to how business is conducted are largely contributed to how much and how the internet is utilized in the workplace. With the internet becoming more commonplace in the workforce it has brought about several advantages, disadvantages, and policy measurements. The advantages are documented and clear to how the internet adds to the memory capabilities, communication, and size and speed of the workplace. Internet helps commercial activities move more effectively. Information becomes more accessible for the decision making process and produces results in a timelier manner using virtual networks, databases, and web pages. Emphasized is the flexibility and convenience of wider coverage using internet. Advances contributed to the internet are communications capabilities such as email, file sharing, creating websites, and e-commerce (Obiri-Yeboah, Owusu-Ansah, & Odei-Lartey, 2013). Emails, Video Conferences, and Chat rooms let a large number of personnel receive the same data in different locations and have a recorded stream of communication...

Words: 765 - Pages: 4

Premium Essay

Acceptable Use Policy

...Acceptable Use Policy This written agreement outlining the terms and conditions of Internet usage, including rules of online behavior and access privileges. Because of the possible misuse of companies -wide computer networks and the Internet by employees having access privileges, Richman Investments are particularly concerned about having a well-developed AUP in place, which is then signed by the all employees and members of Management. Software Access Procedure Software needed, in addition to the Microsoft Office suite of products, must be authorized by your supervisor and downloaded by the IT department. If you need access to software, not currently on the Company network, talk with your supervisor and consult with the IT department. Internet Usage Internet use, on Company time, is authorized to conduct Company business only. Internet use brings the possibility of breaches to the security of confidential Company information. Internet use also creates the possibility of contamination to our system via viruses or spyware. Spyware allows unauthorized people, outside the Company, potential access to Company passwords and other confidential information. Removing such programs from the Company network requires IT staff to invest time and attention that is better devoted to progress. For this reason, and to assure the use of work time appropriately for work, we ask staff members to limit Internet use. Additionally, under no circumstances may Company computers or other electronic...

Words: 523 - Pages: 3

Premium Essay

E-Mail, Internet and Privacy Policies

...Running Header: E-MAIL, INTERNET, AND PRIVACY POLICIES E-Mail, Internet and Privacy Policies University of Phoenix Com 285: Introduction to Business Communication Group: MEBSB039 May 5, 2009 E-Mail, Internet and Privacy Policies With the invention of the internet, many conveniences have been developed to help companies run more efficient. E-Mail was developed to replace standard written messages. This form of communication sped up the receipt of messages from one person to another. Internet and e-mail have become, and will remain a necessary tool for the modern business to succeed. The internet is also used as a way to communicate globally. For instance, a company with offices in the United States and the United Kingdom, now has the ability communicate information at the speed of light. With the advancement of modern technology comes the advancement of ways to steal information and violate the privacy of an employee or the company. Companies have put privacy policies in place to protect employees and the company. Information that could be misused and potentially harm the employee or put the company at risk could easily be sent over the internet through unsecured means. This paper is meant to discuss e-mail, internet use, and privacy policies at the place of employment of the writer. Secondly, we will discuss the laws put in place to regulate employee’s e-mail and internet policies. Thirdly, we will discuss the reasons...

Words: 972 - Pages: 4

Premium Essay

Employee Privacy Report

... 13 2011 Just about every business these days runs off of using the internet and email. Whether it is to communicate with people within the office, or people on the other side of the world, email is usually the main source of communication. Just about every company has their own policies on how their employees can use the internet, some companies have a very limited policy, while other companies are very strict, and certain usage can lead up to termination. It is important to make sure there is a policy in place to make sure the company has leverage when it comes to any illegal use, and aside from that, I am sure businesses do not want to pay their employees for doing non work related things on the internet. Currently, I am a stay at home mom, so there is no policy in place for my internet usage but it has not always been that way. I used to work in the billing division of a transportation company where I had to use the computer, internet, and email in order to effectively do my job. I needed to be able to communicate with other companies as well as co-workers within my office. I also needed to have access to the telephone to communicate with drivers out on the road. The policies there were not very strict but certain websites were blocked from being used. We were not able to access social networking sites such as Facebook or MySpace. Aside from that, we were able to responsibly use the internet. I never really used my place of work to do personal things online, but...

Words: 1093 - Pages: 5

Premium Essay

Social Networking in Business and Human Resources

...Social Networking in Business and Human Resources Rebecca Moriarty Troy University Introduction to Information Systems IS 3300 XTIB Dr. Rodger Morrison February 27, 2011 With the growth and explosion of popularity of the internet in the recent past, there has been a significant increase in the use of social networking sites. More than ever people and businesses are now using the internet with the purpose of having access to social networking sites. It is in these sites that they are able to set up networks with their friends, co-workers and family from all over the world and be able to share their thoughts and ideas on virtually everything spanning from personal issues to work and business advertising. Social networking sites have therefore become a subject that is drawing a lot of research from all over the academic world. In the recent past it has become difficult for people working in human resources departments to avoid the distractions that are being introduced with the rampant use of social networking sites. In the world today millions of people are now subscribed to the providers of the social networking services such as Facebook, MySpace, LinkedIn, and Friendster among many others. The main activities that go on in these sites are online discussions about the common happenings in life, discussions about various interests, organizing of various events, making friends, talking about politics or mere gossip sharing activities (Jackson, 2003)...

Words: 2300 - Pages: 10