...Acceptable Use Policy or AUP is a written policy and an agreement that defines what is allowed and not allowed to be used by employees regarding the use of internet. Here at Richman Investment are giving you, the employees the details and what the policy entails. The use of the Internet is a privilege, not a right, and inappropriate use will result in a cancellation of those privileges. The purpose of the internet resources is to help employees in the performance of their job related functions and not for personal usage. Each employee that is given privileges will have to comply with the company’s policy. Internet usage should be conducted for the company business only. Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information. The use of personal internet must be limited and only to be used for web based emails only with the approval of your Supervisor or Manager. Under no circumstances may Company network to be used on Social networking such as Facebook, or video viewing such as you tube, pornographic, or any unethical use. These websites will be restricted and prohibited for viewing. Doing so can lead to disciplinary action up to and including termination of employment. Like the internet, email should also be for Company purposes only. Any employees are not allowed to send personal emails using Company email...
Words: 576 - Pages: 3
...person who uses a power tool without reading safety guidelines first takes a chance of getting hurt. Although using the Internet may not be physically harmful there still needs to be a set of safety guidelines to adhere to. In 2000 Congress enacted The Children’s Internet Protection Act (CIPA) to address this safety. CIPA imposes that all schools and libraries that receive Internet services at a discounted rate follow certain guidelines to help keep students safe while online. In order to continue receiving the discounted rate schools and libraries must certify that they have an Internet safety policy that includes technology protection measures. Websites that are obscene, contain child pornography, or are harmful to minors must be either blocked or filtered. The policy that schools use is The Acceptable Use Policy (AUP). The Acceptable Use Policy outlines rules regarding internet use so that the students, and staff, are protected. It must address a number of issues including personal safety, illegal activities, system security, privacy, plagiarism, copyright infringement and access to inappropriate materials. In addition, it should make it clear to the student that the school’s technology property is to be used for educational purposes only. Student’s rights, such as free speech, and access to information, should be outlined in the document, as should the consequences for violating the Acceptable Use Policy. Teachers need to discuss the Acceptable Use Policy thoroughly...
Words: 601 - Pages: 3
...Acceptable Use Policy (AUP) The three companies I compared policies with were; SANS, Sopho, and Pinterest. In regards to SANS institute and Sopho they were alike in several ways first of all the AUP was from a employee / company comparison, such as not sharing id's, passwords, company's copyright information etc…They also shared Pirated software not licensed by the company is prohibited. My third choice Pinterest is more of a social site and some of the policies are different because even though your accessing the companies site to post images, opinions etc…they still have AUP in place to restrict users from posting pornographic images, creates a risk of harm, loss, physical or mental injury, emotional distress, death, disability, disfigurement, or physical or mental illness to yourself, to any other person, or to any animal. Researching different companies policies gave me a broader understanding on how to tailor the AUP to better suit the company, in other words they are not all the same. You need to create on a case by case bases. My AUP definition for Richman Investments Acceptable Use and Unacceptable use are as follows; The following activities are, in general, prohibited. Employees may be exempted from these restrictions during the course of their legitimate job responsibilities (e.g., systems administration staff may have a need to disable the network access of a host if that host is disrupting production services). Richman Investments...
Words: 619 - Pages: 3
...Richman Investments ACCEPTABLE USE POLICY Information Security Policy Number 12345 Effective 10/15/2013` I. Introduction An Acceptable Use Policy (AUP) is an organization-wide policy that defines what is allowed and what is not allowed regarding use of Information Technology (IT) assets by employees. The following policy is to be followed by all employees of Richman Investments, authorized individuals, vendors, and contractors who use any information technology (IT), electronic, or communication devices owned and/or provided by Richman Investments for the purpose of assisting them with their job-related duties. Access to the Internet is a privilege and all employees must adhere to the policies regarding computer, email, and Internet usage. Violation of these policies will result in disciplinary and/or legal action that may include counseling, revocation of company devices, termination of the employee, and legal action. II. Roles and Responsibilities Every employee must acknowledge that they have received a copy of the AUP and confirm that they have a complete understanding and agree to abide by the rules set forth in the AUP. Receipt and signing of the AUP will occur at Employee Orientation, and in the event of changes to the policy, a revised AUP must be signed. III. Policy Directives A. Acceptable Use Management Requirements A Standard Operating Procedure (SOP) will be established to support the development and maintenance of this AUP. ...
Words: 747 - Pages: 3
...Acceptable Use of Computers and Networks For Richman Investments I. Introduction Richman Investments’ commitment to great customer service and longevity has always been its legacy. Therefore Richman’s need, to be as secure as possible, is vital. Computers, computing systems, and networks owned by Richman Investment must be secure. All Employees that access any of these resources must comply with specific policies and guidelines stated in this policy. II. Scope This policy applies to all users Richman Investments’ computing and network resources, locally or remotely. III. Policy Statement Employees using the network resources belonging Richman Investment must act in compliance with the policies of this company in regards to using a shared resource. IV. Acceptable Use Guidelines Richman’s Acceptable Use Policy for computers and networks: Employees are responsible for passwords and other security identities. Employee cannot gives access to information to unauthorized personnel. Password must be kept in a secure place and out of view. Employees must use proper security measures to protect information, data, and systems of Richman Investment. Users must protect their computer systems and accounts by using strong passwords, installing anti-virus software specified by the network administration. Unauthorized use of internet, email, and social network site are forbidden. Employees cannot use computers to send, post, or display malicious or offensive messages, text, graphics...
Words: 279 - Pages: 2
...Assignment: Create an Internet and Email Acceptable Use Policy Course Foundations of Computer security Instructor: Amanda Lawrence Cooley Investments is an organization based upon client trust and confidentially. Without the trust placed in the organization by the clients, the organization will cease to exist. As such, every employee should consider their daily actions and the correlation of those actions to the trust placed in the company by the clients. Just as “Employee Smith” would safeguard his home computer against a malware attack, so should he protect the company’s computer from a malware attack. The following will outline the acceptable use of Cooley’s assets regarding Internet and email access and the actions that are prohibited. Cooley Investment’s computers, computer files, e-mail system, Internet access and any software furnished to employees are company property and subject to monitoring and unannounced review. They are to be used for company business only, and not for excessive personal use to communicate with friends or family or to access the Internet for personal purposes. While use of the computer, e-mail and Internet is intended for job-related activities, incidental and occasional brief personal use is permitted within reasonable limits so long as it does not interfere with the employee's work. The company specifically prohibits the use of computers (including Internet access) and the e-mail system in ways that are disruptive, offensive to...
Words: 805 - Pages: 4
...Acceptable Use Policy This written agreement outlining the terms and conditions of Internet usage, including rules of online behavior and access privileges. Because of the possible misuse of companies -wide computer networks and the Internet by employees having access privileges, Richman Investments are particularly concerned about having a well-developed AUP in place, which is then signed by the all employees and members of Management. Software Access Procedure Software needed, in addition to the Microsoft Office suite of products, must be authorized by your supervisor and downloaded by the IT department. If you need access to software, not currently on the Company network, talk with your supervisor and consult with the IT department. Internet Usage Internet use, on Company time, is authorized to conduct Company business only. Internet use brings the possibility of breaches to the security of confidential Company information. Internet use also creates the possibility of contamination to our system via viruses or spyware. Spyware allows unauthorized people, outside the Company, potential access to Company passwords and other confidential information. Removing such programs from the Company network requires IT staff to invest time and attention that is better devoted to progress. For this reason, and to assure the use of work time appropriately for work, we ask staff members to limit Internet use. Additionally, under no circumstances may Company computers or other electronic...
Words: 523 - Pages: 3
...Samantha Landi 10-11-13 Unit 4 Assignment 2 This acceptable use policy grants the right for users to gain access to the network of Richman Investments and also binds the said user to follow and abide accordingly to the agreements set forth for network access provided below. Policy guidelines The use of peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers is strictly forbidden. Downloading executable programs or software from any websites, even known sites, will not be tolerated. The user will not redistribute licensed or copyrighted material without first receiving authorization. Do not export internal software or technical material in violation of export control laws. Introduction of malicious programs into networks or onto systems will not be tolerated. Do not attempt to gain access to unauthorized company resources or information from external or internal sources. Port scanning or data interception on the network is forbidden and legitimate users shall not have a denial of service or circumventing of authentication. Use of programs, scripts, or commands to interfere with other network users is strictly prohibited. Sending unsolicited e-mail messages or junk mail to company recipients is prohibited. There will be no accessing of adult content from company resources. Remote connections from systems failing to meet minimum security requirements will not be allowed. Access to social media websites such as, Google, Facebook...
Words: 257 - Pages: 2
...Richman Investment Acceptable Use Policy A message to all users It has come to our attention that there has been some misuse of our internet and emails. To all employees, we must enforce this Acceptable Use Policy immediately. This document represents Richman Investments policy employees, of Richman Investments communications and computer systems. Our goal is to put controls in place that will help protect our company from Hackers, viruses, data loss, etc. Everyday hundreds of viruses and suspicious messages containing executable files trying to bypass our security systems. These controls will help minimize the potential risks of misuse. This Acceptable Use Policy is your guide for helping us achieve this goal by conducting Richman Investments business with integrity, respect and prudent judgement. Each of us are responsible for upholding the company’s commitment to the highest standards of conduct. Each employee is responsible for the activity of its users and for ensuring that its users follow this Acceptable Use Policy. Violations, which are not promptly remedied by the organization, may result in termination of the company. Introduction: This Acceptable Use Policy is your resource to help you make sound decisions in using communications and computer systems to do your job. Policies: Users must safeguard the confidentiality and integrity of Richman Investments systems, including strong logon password access codes, network access information, and log-on IDs...
Words: 357 - Pages: 2
...Richman Investments Acceptable Use Policy Introduction This acceptable use policy grants the right for users to gain access to the network of Richman Investments and also binds the said user to follow and abide accordingly to the agreements set forth for network access provided below. Policy guidelines * The use of peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers is stricly forbidden. * Downloading executable programs or software from any websites, even known sites, will not be tolerated * The user will not redistribute licensed or copyrighted material without first receiving authorization * Do not export internal software or technical material in violation of export control laws * Introduction of malicious programs into networks or onto systems will not be tolerated * Do not attempt to gain access to unauthorized company resources or information from external or internal sources * Port scanning or data interception on the network is forbidden * Legitimate users shall not have a denial of service or circumventing of authentication * Use of programs, scripts, or commands to interfere with other network users is strictly prohibited. * Sending unsolicited e-mail messages or junk mail to company recipients is prohibited * There will be no accessing of adult content from company resources * Remote connections from systems...
Words: 311 - Pages: 2
...Acceptable Use Policy System and Network Activities The following activities are strictly prohibited, with no exceptions: Email and Communications Activities 1. Sending unsolicited mail messages, including, without limitation, commercial advertising and informational announcements, is explicitly prohibited. A user shall not use another site's mail server to relay mail without the express permission of the site. 2. Any form of harassment via email, telephone or paging, whether through language, frequency, or size of messages. 3. Unauthorized use, or forging, of email header information. 4. Solicitation of email for any other email address, other than that of the poster's account, with the intent to harass or to collect replies. 5. Creating or forwarding "chain letters", "Ponzi" or other "pyramid" schemes of any type. 6. Use of unsolicited email originating from within networks of other Internet/Intranet/Extranet service providers on behalf of, or to advertise any service. 7. Posting the same or similar non-business-related messages to large numbers of Usenet newsgroups (newsgroup spam). 8. Violate any applicable law or regulation; or Encourage or enable any other individual to do any of the activities prohibited in this Acceptable Use Policy. 9. Blogging by employees, whether using Richman Investments property and systems or personal computer systems, is also subject to the terms and restrictions set forth in this Policy. 10. Richman Investments Confidential...
Words: 354 - Pages: 2
...Internet Acceptable Use Policy (AUP) After careful consideration and research of some of the other policies listed by other companies such as AT&T, Widgets Inc, and Amazon Web Services; Richman Investments has come up with the following acceptable use policy (AUP). The following are not allowed at any time: 1. Making of unauthorized promises in e-mail. All emails should have a footer which states that the messages are from the sender only and do not represent the decisions or policies of Richman Investments. 2. Using company resources or web services to visit web sites which contain inappropriate material. This includes pornography, sexually oriented material, or sites which promote or depict discrimination, violence, or illegal activities. 3. Sending big attachments to multiple recipients in the organization. This can tie up the system during a busy point in the day which could end up keeping the company from making profitable decisions. 4. Sending jokes or humorous items on Richman Investments email system. These emails may not be considered funny to some, therefore will not be allowed by any. 5. Making statements concerning race, sexual orientation, disability, religion, or national origin. These statements could be seen as harassment by either the person receiving it or by other people that may see it. 6. Use of company email to support inappropriate activities. Checking a doctor’s appointment is fine, running a side-business is not. 7. Using...
Words: 360 - Pages: 2
...The Company provides employees with electronic communications tools, including an Email System. This written Email Policy, which governs employees’ use of the Company’s email system, applies to email use at the Company’s headquarters and district offices, as well as at remote locations, including but not limited to employees’ homes, airports, hotels, client and supplier offices. The Company’s email rules and policies apply to full-time employees, part-time employees, independent contractors, interns, consultants, suppliers, clients, and other third parties. Any employee who violates the Company’s email rules and policies is subject to disciplinary action, up to and including termination. Email Exists for Business Purposes The Company allows email access primarily for business purposes. Employees may use the Company’s email system for personal use only in accordance with this policy. Employees are prohibited from using personal email software (Hotmail, etc.) for business or personal communications at the office. Authorized Personal Use of Email Employees may use email to communicate with spouses, children, domestic partners, and other family members. Employees’ personal use of email is limited to lunch breaks and work breaks only. Employees may not use email during otherwise productive business hours. Employees are prohibited from using email to operate a business, conduct an external job search, solicit money for personal gain, campaign for political causes or candidates...
Words: 814 - Pages: 4
...Acceptable Use Policy (AUP) You must sign or digitally sign this form prior to issuance of a network userid and password. Initial Awareness Training must be completed prior to signing this agreement. IA Awareness training is found at https://ia.gordon.army.mil/dodiaa/default.asp. The IA Awareness test located on the Fort Gordon website must be completed to fulfill the Awareness training requirement. [pic] By signing this document, you acknowledge and consent that when you access Department of Defense (DoD) information systems: 1. You are accessing a U.S. Government (USG) information system (IS) (which includes any device attached to this information system) that is provided for U.S. Government authorized use only. 2. You consent to the following conditions: a. The U.S. Government routinely intercepts and monitors communications on this information system for purposes including, but not limited to, penetration testing, communications security (COMSEC) monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. b. At any time, the U.S. Government may inspect and seize data stored on this information system. c. Communications using, or data stored on, this information system are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any U.S. Government-authorized purpose. d. This information system...
Words: 2024 - Pages: 9
...Acceptable Use Policy (AUP) Definition After research and careful consideration of some of the other policies listed by other companies such as AT&T, Sprint, T-Mobile, and Verizon Wireless, Richman Investments has come up with the an acceptable use policy (AUP). The following are not allowed at any time: Making of unauthorized promises in e-mail. All emails should have a footer which states that the messages are from the sender only and do not represent the decisions or policies of Richman Investments. Using company resources or web services to visit web sites which contain inappropriate material is prohibited. This includes pornography, sexually oriented material, or sites which promote or depict discrimination, violence, or illegal activities. In addition, it is no longer allowed to have big attachments to multiple recipients in the organization will be enforced. This can tie up the system during a busy point in the day which could end up keeping the company from making profitable decisions. In addition, no jokes or humorous items on Richman Investments email system. These emails may not be considered funny to some, therefore will not be allowed by any. Making statements concerning race, sexual orientation, disability, religion, or national origin are prohibited. These statements could be seen as harassment by either the person receiving it or by other people that may see it. Use of company email to support inappropriate activities is not allowed. Checking a doctor’s...
Words: 324 - Pages: 2