ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Onslow County Schools Division of Media and Instructional Technology This presentation was prepared under fair use exemption of the U.S. Copyright Law.
Woodland Hills School District Computer Network Acceptable Use Policy.
HIPAA Health Insurance Portability and Accountability Act.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
Policy 6460 Staff Use of Computerized Information Resources Regulation 6460 R-Staff Use of Computerized Information Resources Regulation 6460 R.2 Staff.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Boyertown Area School District Acceptable Use Policy.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Data Classification & Privacy Inventory Workshop
Riverside Community School District
کامیار نیرومند کارشناس تیم تجهیزات مرکز تخصصی آپا دانشگاه صنعتی اصفهان پاییز
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
What is it? A set of rules that restricts the ways in which a network, website or system may be used. New members are usually asked to sign an AUP before.
INTERNET and CODE OF CONDUCT
For Students of Humble ISD
Yusuf İ slam Ş EFLEK 11 TM/A 85.  An acceptable use policy is a set of rules applied by the owner/manager of a network, website or large computer system.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Administrative Practices Outcome 1
Security Awareness Norfolk State University Policies.
Acceptable Use Policy.  To promote educational excellence in our district by facilitating resource sharing, innovation, and communication for parents,
Electronic Use Policies.   Social Media  Internet.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
Our Acceptable Use Policy An Overview What is an Acceptable Use Policy (AUP)?
Acceptable Use Policy by Andrew Breen. What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
As a student in the NCCVT school district, you are privileged to have access to your own individual account on the District network. Your account.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
©Dr. Respickius Casmir Network Security Best Practices – Session 2 By Dr. Respickius Casmir.
1 and Internet Safety The internet is a vastly growing research tool that offers insight to the world in which we live. Through the internet we are.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
The goal of BYOD programs is to expand opportunities for 21st Century learning. However, using personally owned devices at school is a privilege, not.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Security and Ethics Safeguards and Codes of Conduct.
EPals ePals is your school account Communicate with group members/teachers stu.gbaps.org.
Woodland Hills School District Computer Network Acceptable Use Policy.
ITACS L.L.P. Policy And Procedures Group 1. Objective: To establish companywide policy with regards to personal device usage both on and off of the company.
Providing access to your data: Handling sensitive data Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Health Insurance Portability and Accountability Act (HIPAA) Primer for Observers, Volunteers, Medical Students Dr. Michael Palumbo- Privacy Officer/ EVP.
Protecting PHI & PII 12/30/2017 6:45 AM
CHAPTER FOUR OVERVIEW SECTION ETHICS
Protection of CONSUMER information
Administrative Practices Outcome 1
Internet Safety and Acceptable Use Policies.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Student User Agreement and Policy 2022
Anuj Dube Jimmy Lambert Michael McClendon
Woodland Hills School District
Presentation transcript:

ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager of a network, website or large computer system that restrict the ways in which the network, website or system may be used. AUP documents are written for corporations, businesses, universities, schools, internet service providers, and website owners, often to reduce the potential for legal action that may be taken by a user, and often with little prospect of enforcement. Wikipedia USE POLICY Jalal Hafidi Mathew Joseph Tolulope Oke Denisa Teme Li Wei

OVERVIEW 1of12 Introduction Objective Roles & Responsibilities Purpose/Scope of Policy Policy Statements  User Accounts  Computing Assets  Network Use  Electronic Communications  Data Security Enforcements Questions

Introduction 2of12 This policy regulates the direct and indirect use of Technology resources across our organization. Technology resources = Strategic assets Computer resources and employees Expectations for appropriate use of these resources.

Objective 3of12 Standard use of technology resources across the organization Familiarization with policy Acceptable use Unacceptable use Formal signature – binding on all employees Original copy and revisions

Roles & Responsibilities 4of12 Users’ Responsibility & Awareness Technology Department CIO & CEO Authority & Enforcement

Purpose & Scope of Policy 5of12 Guidelines for protecting the CIA of MC Inc.’s data Appropriate security requirements and restrictions on the organization’s technology resources Covers all organization’s technology resources

User Accounts 6of12 Password security (system & user-level) Unique user accounts & access Illegal access to other user accounts Employee responsibility

Computing Assets 7of12 Organization’s computer system Laptops taken outside of the organization Devices left overnight Loss & theft Password-protected screensavers, locking screens, & logging off External devices Interference

Network Use 8of12 Copyright material ( illegal software, P2P, etc….) Unauthorized access (accounts, data, servers…) Sharing network passwords Engaging in malicious activities intentionally Using the company’s network for personal use Getting involved in activities causing a disruption of service (DoS for example) Obscene materials

Electronic Communications 9of12 Use of phone lines Company s IDs & accounts Foul languages Forgery Negative use of social media

Data Security 10of12 Proprietary information on personal or non-company approved devices Directories, programs, files, data & documents Confidential data Unauthorized access & misuse to sensitive data Encrypted folders

Enforcement 11of12 Violations of this Acceptable use policy may result in: Suspension or revocation of account & privileges Disciplinary action as described in the Employees’ Code of Conduct handbook Civil or criminal prosecution under federal and/or state law Penalties under such laws may include fines, orders of restitution, and imprisonment

Questions? 12of12 Contact Us Tel: Don’t Forget: When in doubt visit or take a walk to the Technology departmentTechnology department

THANK YOU