Internet Safety and Acceptable Use Policies
What is an Acceptable Use Policy? Acceptable Use Policy (AUP) Code of Conduct for Internet Use Used by Organizations and Businesses Outlines agreement in writing Document signed by employee/participant and the governing organization or business
What’s Included in Policy? Identifies owner of computers/network Defines intended use Identifies unacceptable use Notes consequences Requires signature of acceptance
Why Have a Policy? Protect the company or organization Protect the employee (or computer user) Maintains security
Friendly Reminder
Laws Governing Internet Use Copyright laws Child protection laws Privacy rights and safety National security Laws continue to evolve and change!
Unacceptable Behavior Visiting sites that contain obscene, hateful or otherwise illegal material Using the computer to perpetrate any form of fraud or music piracy Using the Internet to send offensive or harassing material to other users Hacking into unauthorized areas Publishing defamatory and/or knowingly false material about your company, colleagues and/or customers on social networking sites, blogs, etc.
Unacceptable Behavior Revealing confidential information about your company in a personal online posting, upload or transmission (financial information or information relating to customers, business plans, policies, staff and/or internal discussions) Undertaking deliberate activities that waste staff effort or networked resources Introducing any form of malicious software into the corporate network
AUP Consequences Chevron Corp. settled out of court—paying US $2.2 million—after the company was sued because of an e-mail circulated within the company containing offensive material. Microsoft Corp. settled for US $2.2 million a sexual harassment suit involving inappropriate e-mails sent within the company. http://www.isaca.org/Journal/archives/2005/Volume-6/Pages/Best-Practices-for-Establishing-an-Effective-Workplace-Policy-for-Acceptable-Computer-Usage1.aspx
AUP Consequences Xerox fired more than 40 employees for downloading inappropriate images. These downloads choked Xerox's computer system and prevented employees from sending and receiving legitimate e-mails. Wachovia Securities fired six brokers for sending inappropriate images in e-mails. http://www.isaca.org/Journal/archives/2005/Volume-6/Pages/Best-Practices-for-Establishing-an-Effective-Workplace-Policy-for-Acceptable-Computer-Usage1.aspx
LCPS Acceptable Use Students and parents agree by signing the Student R&R page and turning in first week of school each year. Always read a document before you sign it!
LCPS Acceptable Use This computer system is the property of Loudoun County Public Schools. Unauthorized access to this computer system is forbidden. Users (authorized or unauthorized) have no explicit or implicit expectations of privacy. By accessing this computer system, you voluntarily consent to all LCPS’s policies and regulations and you voluntarily consent to having your actions, emails or other electronic information monitored, recorded, seized and disclosed to authorized personnel as determined by LCPS.
Class Assignment: AUP Poster Select ONE key issue of acceptable Internet use in the classroom or workplace and illustrate that in a poster that would make students and/or employees aware of the policy. The poster will be evaluated on creativity, attractiveness, and effectiveness in delivering the message. The poster should be something that could be proudly displayed in a classroom or business setting.