Premium Essay

Employee Internet and Email Acceptable Use Policy

In:

Submitted By zachma
Words 298
Pages 2
Employee Acceptable Use Policy
Internet and Email

Employee Responsibilities:
The use of company-owned computing devices and networks is a privilege, instead of a right, and inappropriate use can result in revocation of such privilege. Employees must remember that their behaviors represent the actions of the company, and the respect to the rights of others and all relevant laws, regulations and contracts. Employees also must be aware of that their inappropriate uses may lead to a catastrophic results on the company and other employees.

Acceptable Uses:
General and authorized uses for achieving the objectives of their job description, and occasional personal communications by using email.

Unacceptable Uses:
For Internet Use, the following actions are prohibited: * Accessing, downloading, storing, recording sites that are offensive, obscene, defamatory, abusive or otherwise unlawful * Knowingly downloading any materials irrelevant to their work * Conducting actions irrelevant to their work, such as playing games, listening to music, watch videos, and etc.
For Email Use, the following actions are prohibited: * Accessing inappropriate sites or inappropriate e-mail * Transmitting private mass mailings * Transmitting messages disclosing personal information without authorization.

Implementation of Policy:
The head of each department is required to file reports of each employees according to their appropriate and inappropriate uses of internet and email. And the security administration committee will make the decision of those inappropriate uses and according penalties.

Reference
1. “Employee Acceptable Use Policy Internet and E-Mail” http://techserv.ucps.k12.nc.us/Policies/AUP_employee.pdf 2. “Mariposa County Internet & Email Use Policy” http://ca-mariposacounty.civicplus.com/DocumentCenter/Home/View/132 3. “Internet and

Similar Documents

Premium Essay

Acceptable Use Policy

...Acceptable Use Policy or AUP is a written policy and an agreement that defines what is allowed and not allowed to be used by employees regarding the use of internet. Here at Richman Investment are giving you, the employees the details and what the policy entails. The use of the Internet is a privilege, not a right, and inappropriate use will result in a cancellation of those privileges. The purpose of the internet resources is to help employees in the performance of their job related functions and not for personal usage. Each employee that is given privileges will have to comply with the company’s policy. Internet usage should be conducted for the company business only. Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information. The use of personal internet must be limited and only to be used for web based emails only with the approval of your Supervisor or Manager. Under no circumstances may Company network to be used on Social networking such as Facebook, or video viewing such as you tube, pornographic, or any unethical use. These websites will be restricted and prohibited for viewing. Doing so can lead to disciplinary action up to and including termination of employment. Like the internet, email should also be for Company purposes only. Any employees are not allowed to send personal emails using Company email...

Words: 576 - Pages: 3

Premium Essay

Acceptable Internet Use Policies

...Necessity of an Acceptable Internet Use Policy for Business William E. Boyle Point Park University Abstract This paper will argue that an Acceptable Internet Use Policy, combined with effective network monitoring and policy enforcement is an essential requirement for businesses to protect business assets and resources. It discusses the potential loss to business from employee misuse of internet access and the danger from external sources. Necessity of an Acceptable Internet Use Policy for Business The internet is an integral part of today’s business resources. Organizations, large and small use the internet to improve organizational efficiencies. Businesses use the internet for everything from worldwide sales using websites, workforce collaboration using email and network data access, and for business research. In most business organizations, all types of devices, from desktop computers to cell phones and PDA’s, allow workers to access the internet and send and receive email on demand. A 2008 study by the Pew Internet & American Life Project found that 53% of Americans are employed, and 96% of these workers have some access to these tools. (Madden, M. & Jones, S., 2008). This allows workers instant access to websites, email and instant messages, but uncontrolled access exposes a business organization to a great risk of financial loss. All businesses must manage this risk through the implementation of an Internet Use Policy combined with employee education...

Words: 2537 - Pages: 11

Premium Essay

Why Establish an Acceptable Use Policy?

...Establish an Acceptable Usage Policy?| | By| Stephen Lyons| | | | Background For the Past 15 years, I have been supporting small businesses with computer problems, ranging from desktop support to network and server integration. I have been a Microsoft® Certified Professional since 1999, and a Microsoft® Certified Small Business Specialist for over a year. I ran my own company, Lyons Den Computer Services, Inc., from 1992-2007. I exclusively serviced businesses with 3-25 workstation and servers. I recently started a new position where I am working with even larger organizations, with over 100 computers per location. One thing most of these companies have in common is a great dependence on technologies such as the internet, email and network connections to the world. Unfortunately, another thing they have in common is a lack of understanding of the depth of security concerns they create by taking advantage of these technologies. One of the largest security holes is often not a missing piece of hardware or software, but a missing piece of documentation that should be in place to protect their investment in all their equipment, personnel and good company name. I am referring to an Acceptable Use Policy for their network and Internet usage. Purpose I intend to show company management just how important this document can be, and why they need one, as well as the importance of keeping it updated. I will show examples of problems a lack of policy can create, and...

Words: 2455 - Pages: 10

Premium Essay

Acceptable Use Policy

...Richman Investments ACCEPTABLE USE POLICY Information Security Policy Number 12345 Effective 10/15/2013` I. Introduction An Acceptable Use Policy (AUP) is an organization-wide policy that defines what is allowed and what is not allowed regarding use of Information Technology (IT) assets by employees. The following policy is to be followed by all employees of Richman Investments, authorized individuals, vendors, and contractors who use any information technology (IT), electronic, or communication devices owned and/or provided by Richman Investments for the purpose of assisting them with their job-related duties. Access to the Internet is a privilege and all employees must adhere to the policies regarding computer, email, and Internet usage. Violation of these policies will result in disciplinary and/or legal action that may include counseling, revocation of company devices, termination of the employee, and legal action. II. Roles and Responsibilities Every employee must acknowledge that they have received a copy of the AUP and confirm that they have a complete understanding and agree to abide by the rules set forth in the AUP. Receipt and signing of the AUP will occur at Employee Orientation, and in the event of changes to the policy, a revised AUP must be signed. III. Policy Directives A. Acceptable Use Management Requirements A Standard Operating Procedure (SOP) will be established to support the development and maintenance of this AUP. ...

Words: 747 - Pages: 3

Premium Essay

Case Study

...inappropriate email from an employee that showcased nude men in a calendar. He also noticed that the email was forwarded to 50 other people in the organization. Pornography in the workplace has become an increasing problem for companies because most employees have access to the internet for work issues, but more and more companies find that the internet is being misused during company hours for inappropriate materials. Most employees feel that as long as they get their work done, they should be able to browse the internet for whatever they want to look at. Employees believe that some personal Internet or email use at work is acceptable and that employers should not have the right to monitor what sites employees are visiting or what e-mails they are sending and receiving. More than 87 percent of employees surveyed stated that it was appropriate for them to surf non-work-related Web sites for at least some portion of the workday. Nearly 84 percent of the employees surveyed indicated that they regularly send non-work-related e-mails each day, with 32 percent sending between 5 and 10 such messages. Almost 57 percent of employees felt that this personal Internet and e-mail use decreased their productivity at work. The best potential solution is computer security software within the company to monitor and block these emails being sent from employee to employee. Computer security software can block access to pornographic sites. An employer can also use an ISP (Internet Service Provider)...

Words: 773 - Pages: 4

Premium Essay

Acceptable Use Policy

...Acceptable Use Policy (AUP) The three companies I compared policies with were; SANS, Sopho, and Pinterest. In regards to SANS institute and Sopho they were alike in several ways first of all the AUP was from a employee / company comparison, such as not sharing id's, passwords, company's copyright information etc…They also shared Pirated software not licensed by the company is prohibited. My third choice Pinterest is more of a social site and some of the policies are different because even though your accessing the companies site to post images, opinions etc…they still have AUP in place to restrict users from posting pornographic images, creates a risk of harm, loss, physical or mental injury, emotional distress, death, disability, disfigurement, or physical or mental illness to yourself, to any other person, or to any animal. Researching different companies policies gave me a broader understanding on how to tailor the AUP to better suit the company, in other words they are not all the same. You need to create on a case by case bases. My AUP definition for Richman Investments Acceptable Use and Unacceptable use are as follows; The following activities are, in general, prohibited. Employees may be exempted from these restrictions during the course of their legitimate job responsibilities (e.g., systems administration staff may have a need to disable the network access of a host if that host is disrupting production services). Richman Investments...

Words: 619 - Pages: 3

Premium Essay

Acceptable Use Policy

...Acceptable Use Policy This written agreement outlining the terms and conditions of Internet usage, including rules of online behavior and access privileges. Because of the possible misuse of companies -wide computer networks and the Internet by employees having access privileges, Richman Investments are particularly concerned about having a well-developed AUP in place, which is then signed by the all employees and members of Management. Software Access Procedure Software needed, in addition to the Microsoft Office suite of products, must be authorized by your supervisor and downloaded by the IT department. If you need access to software, not currently on the Company network, talk with your supervisor and consult with the IT department. Internet Usage Internet use, on Company time, is authorized to conduct Company business only. Internet use brings the possibility of breaches to the security of confidential Company information. Internet use also creates the possibility of contamination to our system via viruses or spyware. Spyware allows unauthorized people, outside the Company, potential access to Company passwords and other confidential information. Removing such programs from the Company network requires IT staff to invest time and attention that is better devoted to progress. For this reason, and to assure the use of work time appropriately for work, we ask staff members to limit Internet use. Additionally, under no circumstances may Company computers or other electronic...

Words: 523 - Pages: 3

Premium Essay

Unit2

...Travis Avery NT2580 Project Part 2 Purpose - This policy defines the security configurations users and Information Technology (IT) administrators are required to implement in order to ensure the integrity, availability, and confidentially of the network environment of Richmond Investments(R.I). It serves as the central policy document with which all employees and contractors must be familiar, and defines regulations that all users must follow. The policy provides IT managers within R.I. with policies and guidelines concerning the acceptable use of R.I. technology equipment, e-mail, Internet connections, network resources, and information processing. The policies and restrictions defined in this document shall apply to all network infrastructures and any other hardware, software, and data transmission mechanisms. This policy must be adhered to by all R.I. employees, temporary workers and by vendors and contractors working with R.I. Scope- This policy document defines the common security requirements for all R.I. personnel and systems that create, maintain, store, access, process or transmit information. This policy also applies to information resources owned by others, such as vendors or contractors of R.I., in cases where R.I. has a legal obligation to protect resources while in R.I. possession. This policy covers all of R.I. network systems which are comprised of various hardware, software, communication equipment and other devices designed to assist the R.I. in the creation...

Words: 598 - Pages: 3

Premium Essay

Unit 3 Assignment 1 Network Security Policy

...Security Policy A secure network infrastructure is needed to protect the integrity of data and mitigate risk of a security incident. The purpose of a specific network infrastructure security policy is to establish the technical guidelines for IT security, and to communicate the controls necessary for a secure network infrastructure. This policy might include specific procedures around device passwords, logs, firewalls, networked hardware, and/or security testing. 7. Internet Use The company will provide internet access to authorized users for business purposes. Requests for permission must be obtain by submitting a request to the Security Administrator. Authorized users will be notified once their information has been setup...

Words: 647 - Pages: 3

Premium Essay

Internet Usage Torts

...XYZ Corporation’s business environment has changed dramatically over the years, especially the manner in which your company can be held liable, or accountable for the actions of your employees. Many small and big businesses like your company have numerous methods to protect themselves from lawsuits in the area of criminal activity and workplace torts. With proper training programs and a comprehensive set of electronic communications policies in place, companies such as yours can reduce many of the criminal and workplace torts that could occur within your workplace or business location and reduce the risk and occurrence of lawsuits and liabilities associated with the improper and illegal usage of the company resources such as Internet usage, email, and use of the company Network and computing systems. Many of the torts that typically occur outside of the workplace can easily occur within the workplace environment because of improper employee use, misuse, or illegal use of the Internet, social media, and email provided by companies such as XYZ Corp. A brief summary of the workplace torts that can create corporate liability and from which corporations and business owners must protect themselves from include but are not limited to: 1. Intentional torts (torts against a person): Assault, Battery, False Imprisonment, and Intentional infliction of emotional distress. 2. Property Torts such as Conversion and Copyright Infringement. 3. Dignitary torts activity that causes injury...

Words: 2924 - Pages: 12

Premium Essay

Acceptable Use Policy

...Assignment: Create an Internet and Email Acceptable Use Policy Course Foundations of Computer security Instructor: Amanda Lawrence Cooley Investments is an organization based upon client trust and confidentially. Without the trust placed in the organization by the clients, the organization will cease to exist. As such, every employee should consider their daily actions and the correlation of those actions to the trust placed in the company by the clients. Just as “Employee Smith” would safeguard his home computer against a malware attack, so should he protect the company’s computer from a malware attack. The following will outline the acceptable use of Cooley’s assets regarding Internet and email access and the actions that are prohibited. Cooley Investment’s computers, computer files, e-mail system, Internet access and any software furnished to employees are company property and subject to monitoring and unannounced review. They are to be used for company business only, and not for excessive personal use to communicate with friends or family or to access the Internet for personal purposes. While use of the computer, e-mail and Internet is intended for job-related activities, incidental and occasional brief personal use is permitted within reasonable limits so long as it does not interfere with the employee's work. The company specifically prohibits the use of computers (including Internet access) and the e-mail system in ways that are disruptive, offensive to...

Words: 805 - Pages: 4

Premium Essay

Case Study Contribution

...As the misconduct represented in the Ajax industries, two organizational contributors use the company’s email for private purpose and spread insulting information that result damage both in their department and the company’s reputation. This irresponsible behaviour can be decreased as abuse of the internet and email by employees called cyber-loafing. The introduction of intranet is purpose to facilitate the communication of employee within an organization and deliver an informed decision making and efficient HR programs identified or drops (Casey S, 2000). The inappropriate use of internet will lead to risk of litigation that employees may send messages to disclose confidentiality information, breaching intellectual property rights or attract defamation or harassment claims (Hepworth A, 1999). Those are the legal and management concerns that a company should adopt. In 2005, for example, according to AMA/ePolicy Institute survey one out of every four U.S. companies cancelled employment contracts for misusing email. Meantime employee cannot expect any privacy for mail that exchange with company infrastructure: computers, wired or wireless networks or email (SMTP, IMAP, POP, Exchange, Notes) servers (Heinz T, 2012) Over the past decade, employee Internet misuse and abuse has become a growing concern that has impacted several predominant corporations. The New York Times fired 22 employees in Virginia for allegedly distributing potentially offensive electronic mail. Merck had disciplined...

Words: 557 - Pages: 3

Premium Essay

Acceptabe Use Policy

...From: Subject: Acceptable Email and Internet usage policy. Good Afternoon Staff, Management at Voogi realizes that emails are an important means of communication and recognizes the importance of proper email content working in a professional environment and delivering good customer service. Users should take the same care in writing an email as well as producing any other form of communication. Please adhere to the following guidelines. The Internet Usage Policy applies to all employees who are employed by the Voogi clothing company and who have access to computers and the Internet to be used in the performance of their work. Emails sent through the company email system should not contain content that is deemed to be offensive. * Any email content that can discriminate against is prohibited along with the use of vulgar or harassing language and images. * Management and other authorized staff have the right to access any material in your email or on your computer at any time. Company employees are expected to use the Internet responsibly and productively. * Under no condition may any computers that are owned by the company or other electronic equipment, (including devices owned by the employee), be used on company time, be used for non-business-related Internet sites. Job-related activities include research and educational tasks that may be found on the Internet that would help in an employee's role are permitted. * All Internet data that is...

Words: 384 - Pages: 2

Premium Essay

Define a Lan-to-Wan, Internet, and Web Surfing Aup That Restricts Usage of the Company’s Internet Connection and Permits the Company to Monitor Usage of the Corporate Internet Connection.

...Acceptable Use Policy CSS150-1301B-01 Luz Centeno March 4, 2013 Prof. Cordero Acceptable Use Policy To fully explain the acceptable use policy would mean to begin from the beginning, the user domain. The user domain is the employee or people within an organization who is granted access to the information system for the organization. There are roles and tasks, responsibility, and accountability that go into an acceptable use policy for the user domain. Within the user domain is the access of LAN to Wan, web surfing, and internet. LAN to Wan is the activities between LAN to Wan and firewalls, routers, intrusion, detection, and workstations. Web surfing determines what a user can do on company time with company resources. Internet is when the user has access to the internet what types of controls should the organization have on the certain internet sites being accessed. Although they all sort of are the same they are very much different (Cordero, 2013). For the Lan to Wan AUP will go hand in hand with the roles and tasks parts of the user domain. Users would be given access to certain systems, applications, and data depending on their access rights. The AUP is like a rulebook that employees need to follow when using an organization’s IT assets and if they are violated it could be grounds for termination. The AUP will set grounds on employees to understand that they are responsible for any and all actions on an organization’s IT assets. In particular to organizations...

Words: 771 - Pages: 4

Premium Essay

Policy

...Acceptable email use policy - sample template Use of email by employees of [business name] is permitted and encouraged where such use supports the goals and objectives of the business. However, [business name] has a policy for the use of email whereby the employee must ensure that they: • comply with current legislation • use email in an acceptable way • do not create unnecessary business risk to the company by their misuse of the internet Unacceptable behaviour The following behaviour by an employee is considered unacceptable: • use of company communications systems to set up personal businesses or send chain letters • forwarding of company confidential messages to external locations • distributing, disseminating or storing images, text or materials that might be considered indecent, pornographic, obscene or illegal • distributing, disseminating or storing images, text or materials that might be considered discriminatory, offensive or abusive, in that the context is a personal attack, sexist or racist, or might be considered as harassment • accessing copyrighted information in a way that violates the copyright • breaking into the company’s or another organisation’s system or unauthorised use of a password/mailbox • broadcasting unsolicited personal views on social, political, religious or other non-business related matters • transmitting unsolicited commercial or advertising material • undertaking deliberate activities that waste staff effort or networked resources ...

Words: 466 - Pages: 2