Acceptable Use Policy

In: Computers and Technology

Submitted By hazelle311
Words 576
Pages 3
Acceptable Use Policy or AUP is a written policy and an agreement that defines what is
allowed and not allowed to be used by employees regarding the use of internet. Here
at Richman Investment are giving you, the employees the details and what the policy
entails. The use of the Internet is a privilege, not a right, and inappropriate use will result
in a cancellation of those privileges. The purpose of the internet resources is to help
employees in the performance of their job related functions and not for personal usage.
Each employee that is given privileges will have to comply with the company’s policy.

Internet usage should be conducted for the company business only. Internet use
creates the possibility of virus attacks or allowing any unauthorized people to get into
our system with the potential of accessing company’s confidential information. The use
of personal internet must be limited and only to be used for web based emails only with
the approval of your Supervisor or Manager. Under no circumstances may Company
network to be used on Social networking such as Facebook, or video viewing such as
you tube, pornographic, or any unethical use. These websites will be restricted and
prohibited for viewing. Doing so can lead to disciplinary action up to and including
termination of employment.

Like the internet, email should also be for Company purposes only. Any employees are
not allowed to send personal emails using Company email. Use Company email in an
acceptable way and do not create business risk to the company. Confidential
information must not be shared outside the Company. Emails that are sent
with an attachment from an unknown sources should not be downloaded as they may
create viruses into the Company’s system. No forwarding personal emails to co-wokers,

friends or relatives during Company time…...

Similar Documents

Acceptable Use Policy

...Acceptable Use of Computers and Networks For Richman Investments   I. Introduction Richman Investments’ commitment to great customer service and longevity has always been its legacy. Therefore Richman’s need, to be as secure as possible, is vital. Computers, computing systems, and networks owned by Richman Investment must be secure. All Employees that access any of these resources must comply with specific policies and guidelines stated in this policy. II. Scope This policy applies to all users Richman Investments’ computing and network resources, locally or remotely. III. Policy Statement Employees using the network resources belonging Richman Investment must act in compliance with the policies of this company in regards to using a shared resource. IV. Acceptable Use Guidelines Richman’s Acceptable Use Policy for computers and networks: Employees are responsible for passwords and other security identities. Employee cannot gives access to information to unauthorized personnel. Password must be kept in a secure place and out of view. Employees must use proper security measures to protect information, data, and systems of Richman Investment. Users must protect their computer systems and accounts by using strong passwords, installing anti-virus software specified by the network administration. Unauthorized use of internet, email, and social network site are forbidden. Employees cannot use computers to send, post, or display malicious or offensive messages, text,......

Words: 279 - Pages: 2

Acceptable Use Policy

...Acceptable Use Policy or AUP is a written policy and an agreement that defines what is allowed and not allowed to be used by employees regarding the use of internet. Here at Richman Investment are giving you, the employees the details and what the policy entails. The use of the Internet is a privilege, not a right, and inappropriate use will result in a cancellation of those privileges. The purpose of the internet resources is to help employees in the performance of their job related functions and not for personal usage. Each employee that is given privileges will have to comply with the company’s policy. Internet usage should be conducted for the company business only. Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information. The use of personal internet must be limited and only to be used for web based emails only with the approval of your Supervisor or Manager. Under no circumstances may Company network to be used on Social networking such as Facebook, or video viewing such as you tube, pornographic, or any unethical use. These websites will be restricted and prohibited for viewing. Doing so can lead to disciplinary action up to and including termination of employment. Like the internet, email should also be for Company purposes only. Any employees are not allowed to send personal emails using Company...

Words: 576 - Pages: 3

Acceptable Use Policy

...Internet Acceptable Use Policy (AUP) After careful consideration and research of some of the other policies listed by other companies such as AT&T, Widgets Inc, and Amazon Web Services; Richman Investments has come up with the following acceptable use policy (AUP). The following are not allowed at any time: 1. Making of unauthorized promises in e-mail. All emails should have a footer which states that the messages are from the sender only and do not represent the decisions or policies of Richman Investments. 2. Using company resources or web services to visit web sites which contain inappropriate material. This includes pornography, sexually oriented material, or sites which promote or depict discrimination, violence, or illegal activities. 3. Sending big attachments to multiple recipients in the organization. This can tie up the system during a busy point in the day which could end up keeping the company from making profitable decisions. 4. Sending jokes or humorous items on Richman Investments email system. These emails may not be considered funny to some, therefore will not be allowed by any. 5. Making statements concerning race, sexual orientation, disability, religion, or national origin. These statements could be seen as harassment by either the person receiving it or by other people that may see it. 6. Use of company email to support inappropriate activities. Checking a doctor’s appointment is fine, running a side-business is not. 7...

Words: 360 - Pages: 2

Acceptable Use Policy

...Richman Investments Acceptable Use Policy Introduction This acceptable use policy grants the right for users to gain access to the network of Richman Investments and also binds the said user to follow and abide accordingly to the agreements set forth for network access provided below. Policy guidelines * The use of peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers is stricly forbidden. * Downloading executable programs or software from any websites, even known sites, will not be tolerated * The user will not redistribute licensed or copyrighted material without first receiving authorization * Do not export internal software or technical material in violation of export control laws * Introduction of malicious programs into networks or onto systems will not be tolerated * Do not attempt to gain access to unauthorized company resources or information from external or internal sources * Port scanning or data interception on the network is forbidden * Legitimate users shall not have a denial of service or circumventing of authentication * Use of programs, scripts, or commands to interfere with other network users is strictly prohibited. * Sending unsolicited e-mail messages or junk mail to company recipients is prohibited * There will be no accessing of adult content from company resources * Remote connections from...

Words: 311 - Pages: 2

Acceptable Use Policy

... Lawyers In order to preserve the attorney-client privilege for communications between lawyers and clients, never use e-mail to seek legal advice or pose a legal question. Business Record Retention E-mail messages are written business records, and are subject to the Company’s written and consistently applied rules and policies for retaining and deleting business records. See the Company’s business record retention policy for more information. Violations These guidelines are intended to provide Company employees with general examples of acceptable and unacceptable use of the Company’s email system. A violation of this policy may result in disciplinary action up to and including termination. Acknowledgement If you have questions about the above policies and procedures, address them to the Compliance Officer before signing the following agreement. I have read the Company’s Email Policy and agree to abide by it. I understand that a violation of any of the above policies and procedures may result in disciplinary action, up to and including my termination. ______________________________ Employee Name (Printed) ______________________________...

Words: 814 - Pages: 4

Acceptable Use Policy

...Acceptable Use Policy This written agreement outlining the terms and conditions of Internet usage, including rules of online behavior and access privileges. Because of the possible misuse of companies -wide computer networks and the Internet by employees having access privileges, Richman Investments are particularly concerned about having a well-developed AUP in place, which is then signed by the all employees and members of Management. Software Access Procedure Software needed, in addition to the Microsoft Office suite of products, must be authorized by your supervisor and downloaded by the IT department. If you need access to software, not currently on the Company network, talk with your supervisor and consult with the IT department. Internet Usage Internet use, on Company time, is authorized to conduct Company business only. Internet use brings the possibility of breaches to the security of confidential Company information. Internet use also creates the possibility of contamination to our system via viruses or spyware. Spyware allows unauthorized people, outside the Company, potential access to Company passwords and other confidential information. Removing such programs from the Company network requires IT staff to invest time and attention that is better devoted to progress. For this reason, and to assure the use of work time appropriately for work, we ask staff members to limit Internet use. Additionally, under no circumstances may Company computers or other...

Words: 523 - Pages: 3

Acceptable Use Policy

...Acceptable Use Policy System and Network Activities The following activities are strictly prohibited, with no exceptions: Email and Communications Activities 1. Sending unsolicited mail messages, including, without limitation, commercial advertising and informational announcements, is explicitly prohibited. A user shall not use another site's mail server to relay mail without the express permission of the site. 2. Any form of harassment via email, telephone or paging, whether through language, frequency, or size of messages. 3. Unauthorized use, or forging, of email header information. 4. Solicitation of email for any other email address, other than that of the poster's account, with the intent to harass or to collect replies. 5. Creating or forwarding "chain letters", "Ponzi" or other "pyramid" schemes of any type. 6. Use of unsolicited email originating from within networks of other Internet/Intranet/Extranet service providers on behalf of, or to advertise any service. 7. Posting the same or similar non-business-related messages to large numbers of Usenet newsgroups (newsgroup spam). 8. Violate any applicable law or regulation; or Encourage or enable any other individual to do any of the activities prohibited in this Acceptable Use Policy. 9. Blogging by employees, whether using Richman Investments property and systems or personal computer systems, is also subject to the terms and restrictions set forth in this Policy. 10. Richman Investments...

Words: 354 - Pages: 2

Acceptable Use Policy Definition

...Acceptable Use Policy (AUP) Definition After research and careful consideration of some of the other policies listed by other companies such as AT&T, Sprint, T-Mobile, and Verizon Wireless, Richman Investments has come up with the an acceptable use policy (AUP). The following are not allowed at any time: Making of unauthorized promises in e-mail. All emails should have a footer which states that the messages are from the sender only and do not represent the decisions or policies of Richman Investments. Using company resources or web services to visit web sites which contain inappropriate material is prohibited. This includes pornography, sexually oriented material, or sites which promote or depict discrimination, violence, or illegal activities. In addition, it is no longer allowed to have big attachments to multiple recipients in the organization will be enforced. This can tie up the system during a busy point in the day which could end up keeping the company from making profitable decisions. In addition, no jokes or humorous items on Richman Investments email system. These emails may not be considered funny to some, therefore will not be allowed by any. Making statements concerning race, sexual orientation, disability, religion, or national origin are prohibited. These statements could be seen as harassment by either the person receiving it or by other people that may see it. Use of company email to support inappropriate activities is not allowed. Checking a......

Words: 324 - Pages: 2

Acceptable Use Policy

...Acceptable Use Policy (AUP) The three companies I compared policies with were; SANS, Sopho, and Pinterest. In regards to SANS institute and Sopho they were alike in several ways first of all the AUP was from a employee / company comparison, such as not sharing id's, passwords, company's copyright information etc…They also shared Pirated software not licensed by the company is prohibited. My third choice Pinterest is more of a social site and some of the policies are different because even though your accessing the companies site to post images, opinions etc…they still have AUP in place to restrict users from posting pornographic images, creates a risk of harm, loss, physical or mental injury, emotional distress, death, disability, disfigurement, or physical or mental illness to yourself, to any other person, or to any animal. Researching different companies policies gave me a broader understanding on how to tailor the AUP to better suit the company, in other words they are not all the same. You need to create on a case by case bases. My AUP definition for Richman Investments Acceptable Use and Unacceptable use are as follows; The following activities are, in general, prohibited. Employees may be exempted from these restrictions during the course of their legitimate job responsibilities (e.g., systems administration staff may have a need to disable the network access of a host if that host is disrupting production services). Richman...

Words: 619 - Pages: 3

Acceptable Use Policy

...Richman Investments ACCEPTABLE USE POLICY Information Security Policy Number 12345 Effective 10/15/2013` I. Introduction An Acceptable Use Policy (AUP) is an organization-wide policy that defines what is allowed and what is not allowed regarding use of Information Technology (IT) assets by employees. The following policy is to be followed by all employees of Richman Investments, authorized individuals, vendors, and contractors who use any information technology (IT), electronic, or communication devices owned and/or provided by Richman Investments for the purpose of assisting them with their job-related duties. Access to the Internet is a privilege and all employees must adhere to the policies regarding computer, email, and Internet usage. Violation of these policies will result in disciplinary and/or legal action that may include counseling, revocation of company devices, termination of the employee, and legal action. II. Roles and Responsibilities Every employee must acknowledge that they have received a copy of the AUP and confirm that they have a complete understanding and agree to abide by the rules set forth in the AUP. Receipt and signing of the AUP will occur at Employee Orientation, and in the event of changes to the policy, a revised AUP must be signed. III. Policy Directives A. Acceptable Use Management Requirements A Standard Operating Procedure (SOP) will be established to support the development and maintenance of this AUP...

Words: 747 - Pages: 3

Acceptable Use Policy

...Samantha Landi 10-11-13 Unit 4 Assignment 2 This acceptable use policy grants the right for users to gain access to the network of Richman Investments and also binds the said user to follow and abide accordingly to the agreements set forth for network access provided below. Policy guidelines       The use of peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers is strictly forbidden. Downloading executable programs or software from any websites, even known sites, will not be tolerated. The user will not redistribute licensed or copyrighted material without first receiving authorization. Do not export internal software or technical material in violation of export control laws. Introduction of malicious programs into networks or onto systems will not be tolerated. Do not attempt to gain access to unauthorized company resources or information from external or internal sources. Port scanning or data interception on the network is forbidden and legitimate users shall not have a denial of service or circumventing of authentication.       Use of programs, scripts, or commands to interfere with other network users is strictly prohibited. Sending unsolicited e-mail messages or junk mail to company recipients is prohibited. There will be no accessing of adult content from company resources. Remote connections from systems failing to meet minimum security requirements will not be allowed. Access to social media websites such as, Google,......

Words: 257 - Pages: 2

Acceptable Use Policy

...21st Century Safety in Schools Connie Holden Eastern New Mexico University 21st Century Safety in Schools The Internet is a tool for both educators and students. Just as with any tool, especially power tools, we need to read safety precautions before using it. A person who uses a power tool without reading safety guidelines first takes a chance of getting hurt. Although using the Internet may not be physically harmful there still needs to be a set of safety guidelines to adhere to. In 2000 Congress enacted The Children’s Internet Protection Act (CIPA) to address this safety. CIPA imposes that all schools and libraries that receive Internet services at a discounted rate follow certain guidelines to help keep students safe while online. In order to continue receiving the discounted rate schools and libraries must certify that they have an Internet safety policy that includes technology protection measures. Websites that are obscene, contain child pornography, or are harmful to minors must be either blocked or filtered. The policy that schools use is The Acceptable Use Policy (AUP). The Acceptable Use Policy outlines rules regarding internet use so that the students, and staff, are protected. It must address a number of issues including personal safety, illegal activities, system security, privacy, plagiarism, copyright infringement and access to inappropriate materials. In addition, it should make it clear to the student that the school’s technology property is...

Words: 601 - Pages: 3

Acceptable Use Policy Breakdown

...Introduction - A general description and scope of the contents of the policy. #Acceptable Use Policy This policy is used to establish a culture of trust and integrity amongst the employees and users of the network. The acceptable use policy should contain an overview, purpose, scope, general use & ownership and un-acceptable use sub-sections. Email Policy The policy defines standards for conducting communications within the corperate network email system. These standards minimize the potential exposure to the company from unsolicited email messages and attachments. The email policy should contain a purpose and enforcement sub-sections. Anti-Virus Policy The policy defines standards for protecting the company’s network from any threat related to maleware Identity Policy The policy defines rules and practices for protecting the corporate network from unauthorized access. The Identity policy identifies who each user is and what resources they are allowed to access. The identity policy should contain sub-sections on purpose, employee training, visitors (i.e.temps, contractors and consultants,) and prohibited practices. Password Policy Passwords are an important aspect of netwok security. They are the front line of protection for user accounts. The password policy should contain sub-sections on purpose, scope, policies, guidelines and enforcement. Encryption Policy This policy provides guidance so that encryption efforts will use only those...

Words: 476 - Pages: 2

Internet Acceptable Use Policy

... not on this list. Refer to “Acceptable and Approved Devices Within Your Company” in your employee handbook Goals Goals are set instances that are perceived as a milestone and an accomplishment. Goals are what set and even raise a bar to a certain degree and when achieved, it can be pertained as if one has done great or one has completed a hard task. Goals are not often rewarded because often times the goal itself is the reward. This policy is implemented to achieve certain goals that will achieve better aspects of the company OMNICORP. Such aspects include but are not limited to Company Moral, Employee Moral, Effectiveness, Safety, etc.. Following this line includes a few specific goals that will be achieved with this policy in effect. * Ability to increase the potential security of the company. This will result in system that will only be proprietary to OMNICORP * Effectively and Collectively inform employees about the code of conduct we believe in here at OMNICORP * Manage to deplete, if not help depletion, in any unnecessary action on the internet which can cause disclosure of OMNICORP business models, inventory, processes, and more. Detailed Internet Use Policy Provisions General OMNICORP has software and systems in place that monitor and record all internet usage. Our security systems are capable of recording (for each and every user) each World Wide Web site visit and each email message into and out of our internal networks, and we reserve...

Words: 1678 - Pages: 7

Acceptable Use Policy

...Assignment: Create an Internet and Email Acceptable Use Policy Course Foundations of Computer security Instructor: Amanda Lawrence Cooley Investments is an organization based upon client trust and confidentially. Without the trust placed in the organization by the clients, the organization will cease to exist. As such, every employee should consider their daily actions and the correlation of those actions to the trust placed in the company by the clients. Just as “Employee Smith” would safeguard his home computer against a malware attack, so should he protect the company’s computer from a malware attack. The following will outline the acceptable use of Cooley’s assets regarding Internet and email access and the actions that are prohibited. Cooley Investment’s computers, computer files, e-mail system, Internet access and any software furnished to employees are company property and subject to monitoring and unannounced review. They are to be used for company business only, and not for excessive personal use to communicate with friends or family or to access the Internet for personal purposes. While use of the computer, e-mail and Internet is intended for job-related activities, incidental and occasional brief personal use is permitted within reasonable limits so long as it does not interfere with the employee's work. The company specifically prohibits the use of computers (including Internet access) and the e-mail system in ways that are disruptive, offensive...

Words: 805 - Pages: 4