Monday, May 20, 2019

Acceptable Use Policy Essay

An Acceptable Use Policy (AUP) is an organization-wide policy that defines what is alone toldowed and what is non every last(predicate)owed regarding use of cultivation Technology (IT) assets by employees. The following policy is to be followed by all employees of Richman Investments, authorized individuals, vendors, and contractors who use any(prenominal) information engine room (IT), electronic, or communication devices owned and/or provided by Richman Investments for the purpose of assisting them with their job-related duties.Access to the Internet is a perquisite and all employees must adhere to the policies regarding computer, email, and Internet usage. Violation of these policies will result in disciplinary and/or legal action that may include counseling, revocation of company devices, termination of the employee, and legal action. II. Roles and Responsibilities Every employee must acknowledge that they have received a copy of the AUP and confirm that they have a compl ete understand and agree to abide by the rules set forth in the AUP.See more Basic economical problem of Scarcity EssayReceipt and signing of the AUP will occur at Employee Orientation, and in the way out of changes to the policy, a revised AUP must be signed. III. Policy Directives A. Acceptable Use Management Requirements A touchstone Operating Procedure (SOP) will be established to support the development and maintenance of this AUP. Richman Investments management squad is responsible for keeping the AUP up to current standards and ensuring that new and current employees are kept abreast of major(ip) changes and that signatures are obtained from each employee following these changes.At a minimum, skills that should be included include annual exploiter Training and Awareness. A formal review cycle will be established to review all Acceptable Use initiatives. B. Ownership Any electronic files created, sent, received, or stored under the custody of Richman Investments are the billet of Richman Investments and use of these files by employees is neither personal nor private. Richman Investments management has the right to monitor and/or log all employee use with or without prior notice. C. Acceptable Use RequirementsAll users must tarradiddle any incidents of doable misuse or violation of this AUP. Users must not attempt to access any documents, data, email, or programs in which they are not authorized to do so. Users must report any weaknesses in computer tribute to the management and/or the appropriate security staff. Users must not share their account passwords, PINs, or Smartcards use for identification and authorization purposes. Users must not make any copies of copyrighted materials or Richman Investments-owned software.Users must not engage in activity that Richman Investments may consider to be indecent, obscene, offensive, or that is illegal according to any law. Users must not download, install or run security programs or utilities such as s canners or password cracking programs that exploit weaknesses in the security of Richman Investments computers systems. Access to the Internet from company-owned, home-based computers must follow all rules and regulations outlined for in-house computer resources.Any security issues will be reported to and followed up on by management for further investigation. D. Incidental Use Incidental use of email, Internet access, FAX machines, printers, and copiers is restricted to ratified users only and does not include family members. These must not result in direct costs to Richman Investments or cause legal action to be taken. Incidental use must not interfere with the normal performance of any employees work duties. Storage of voice messages, email messages, files and documents must be limited. IV. Enforcement, Auditing, reportingRichman Investments management is responsible for the periodic auditing and reporting of compliance with this policy. Violation of this policy may results in disciplinary action that may include counseling and/or termination, depending upon the seriousness of the infraction. Any employee may anonymously report policy violations via Richman Investments Intranet or by telephone at 303-303-3030. IV. References A. Richman Investment POLICY Information Security. 2013. P 1-6. B. Information Technology Acceptable Use Policies and Procedures. 2013. P 1-8. C. Internet Usage Policy. 2013. P 1-2.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.