Download presentation
Presentation is loading. Please wait.
Published byMarian Horton Modified over 9 years ago
1
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager of a network, website or large computer system that restrict the ways in which the network, website or system may be used. AUP documents are written for corporations, businesses, universities, schools, internet service providers, and website owners, often to reduce the potential for legal action that may be taken by a user, and often with little prospect of enforcement. Wikipedia USE POLICY Jalal Hafidi Mathew Joseph Tolulope Oke Denisa Teme Li Wei
2
OVERVIEW 1of12 Introduction Objective Roles & Responsibilities Purpose/Scope of Policy Policy Statements User Accounts Computing Assets Network Use Electronic Communications Data Security Enforcements Questions
3
Introduction 2of12 This policy regulates the direct and indirect use of Technology resources across our organization. Technology resources = Strategic assets Computer resources and employees Expectations for appropriate use of these resources.
4
Objective 3of12 Standard use of technology resources across the organization Familiarization with policy Acceptable use Unacceptable use Formal signature – binding on all employees Original copy and revisions
5
Roles & Responsibilities 4of12 Users’ Responsibility & Awareness www.mcinc.com/policies Technology Department CIO & CEO Authority & Enforcement
6
Purpose & Scope of Policy 5of12 Guidelines for protecting the CIA of MC Inc.’s data Appropriate security requirements and restrictions on the organization’s technology resources Covers all organization’s technology resources
7
User Accounts 6of12 Password security (system & user-level) Unique user accounts & access Illegal access to other user accounts Employee responsibility
8
Computing Assets 7of12 Organization’s computer system Laptops taken outside of the organization Devices left overnight Loss & theft Password-protected screensavers, locking screens, & logging off External devices Interference
9
Network Use 8of12 Copyright material ( illegal software, P2P, etc….) Unauthorized access (accounts, data, servers…) Sharing network passwords Engaging in malicious activities intentionally Using the company’s network for personal use Getting involved in activities causing a disruption of service (DoS for example) Obscene materials
10
Electronic Communications 9of12 Use of phone lines Company e-mails E-mail IDs & accounts Foul languages Forgery Negative use of social media
11
Data Security 10of12 Proprietary information on personal or non-company approved devices Directories, programs, files, data & documents Confidential data Unauthorized access & misuse to sensitive data Encrypted folders
12
Enforcement 11of12 Violations of this Acceptable use policy may result in: Suspension or revocation of account & privileges Disciplinary action as described in the Employees’ Code of Conduct handbook Civil or criminal prosecution under federal and/or state law Penalties under such laws may include fines, orders of restitution, and imprisonment
13
Questions? 12of12 Contact Us Tel:123-345-7896 help@mc.com Don’t Forget: When in doubt visit www.mcinc.com/policies/aupwww.mcinc.com/policies/aup or take a walk to the Technology departmentTechnology department
14
THANK YOU
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.