Premium Essay

Internet Acceptable Use Policy

In:

Submitted By pyrosax
Words 1678
Pages 7
INTUSE-2014-POL
INTUSE-2014-POL
OMNICORP Industries

14
Internet Use Policy
OMNICORP Devices
Rodriguez, Jacob Isiah CTR NSWC Corona, MS41 CONT

OMNICORP Industries

14
Internet Use Policy
OMNICORP Devices
Rodriguez, Jacob Isiah CTR NSWC Corona, MS41 CONT

Change Management | Version History

VERSION | NAME | CHANGES | DATE | APPROVED BY | 1.2 | Jacob Rodriguez | Modify Policy | 8/19/2014 | Jacob Rodriguez | 1.1 | Jacob Rodriguez | Extend and refine the policy | 7/25/2014 | Jacob Rodriguez | 1.0 | Jacob Rodriguez | Creation | 7/1/2014 | Jacob Rodriguez |

Introduction

OMNICORP makes internet access available to its employees where relevant and useful for their jobs. It is unfortunate that the internet can be so great but yet so risky. Accordingly, this policy shall be categorized as “Highly Important”. This will ensure the proper individuals and systems follow the policy.
This internet use policy describes the rules governing internet use at the company. It also sets out how staff members are expected to behave when using the internet. As OMNICORP grows their products and services so shall this policy implementation and structure.
This policy should be read alongside other key policies. The company’s Data protection and email policies are particularly relevant to staff who use the internet

Purpose

The internet is a powerful tool that can bring significant benefits to OMNICORP.
However, it’s important every person at the company who uses the internet understands how to use it responsibly, safely and legally
This internet use policy: * Reduces the Online Security Risks faced by OMNICORP * Let’s staff know what they Can and Can’t Do online * Ensures employees Do Not View Inappropriate Content at work * Helps the company Satisfy its Legal Obligations regarding internet use

Scope

This policy applies to all

Similar Documents

Premium Essay

Acceptable Internet Use Policies

...Necessity of an Acceptable Internet Use Policy for Business William E. Boyle Point Park University Abstract This paper will argue that an Acceptable Internet Use Policy, combined with effective network monitoring and policy enforcement is an essential requirement for businesses to protect business assets and resources. It discusses the potential loss to business from employee misuse of internet access and the danger from external sources. Necessity of an Acceptable Internet Use Policy for Business The internet is an integral part of today’s business resources. Organizations, large and small use the internet to improve organizational efficiencies. Businesses use the internet for everything from worldwide sales using websites, workforce collaboration using email and network data access, and for business research. In most business organizations, all types of devices, from desktop computers to cell phones and PDA’s, allow workers to access the internet and send and receive email on demand. A 2008 study by the Pew Internet & American Life Project found that 53% of Americans are employed, and 96% of these workers have some access to these tools. (Madden, M. & Jones, S., 2008). This allows workers instant access to websites, email and instant messages, but uncontrolled access exposes a business organization to a great risk of financial loss. All businesses must manage this risk through the implementation of an Internet Use Policy combined with employee education...

Words: 2537 - Pages: 11

Premium Essay

Employee Internet and Email Acceptable Use Policy

...Employee Acceptable Use Policy Internet and Email Employee Responsibilities: The use of company-owned computing devices and networks is a privilege, instead of a right, and inappropriate use can result in revocation of such privilege. Employees must remember that their behaviors represent the actions of the company, and the respect to the rights of others and all relevant laws, regulations and contracts. Employees also must be aware of that their inappropriate uses may lead to a catastrophic results on the company and other employees. Acceptable Uses: General and authorized uses for achieving the objectives of their job description, and occasional personal communications by using email. Unacceptable Uses: For Internet Use, the following actions are prohibited: * Accessing, downloading, storing, recording sites that are offensive, obscene, defamatory, abusive or otherwise unlawful * Knowingly downloading any materials irrelevant to their work * Conducting actions irrelevant to their work, such as playing games, listening to music, watch videos, and etc. For Email Use, the following actions are prohibited: * Accessing inappropriate sites or inappropriate e-mail * Transmitting private mass mailings * Transmitting messages disclosing personal information without authorization. Implementation of Policy: The head of each department is required to file reports of each employees according to their appropriate and inappropriate uses of internet and...

Words: 298 - Pages: 2

Premium Essay

Netw 584 Week 7 Course Project Complete Final Paper

...Description First page 1. Internet Acceptable Use and Regulation Policy PaperClass: Telecom Law and Regulation NETW 584 WEEK 7 COURSE PROJECT COMPLETE FINAL PAPER Purchase here https://sellfy.com/p/hU6S/ Product Description First page 1. Internet Acceptable Use and Regulation Policy PaperClass: Telecom Law and Regulation NETW 584 WEEK 7 COURSE PROJECT COMPLETE FINAL PAPER Purchase here https://sellfy.com/p/hU6S/ Product Description First page 1. Internet Acceptable Use and Regulation Policy PaperClass: Telecom Law and Regulation NETW 584 WEEK 7 COURSE PROJECT COMPLETE FINAL PAPER Purchase here https://sellfy.com/p/hU6S/ Product Description First page 1. Internet Acceptable Use and Regulation Policy PaperClass: Telecom Law and Regulation NETW 584 WEEK 7 COURSE PROJECT COMPLETE FINAL PAPER Purchase here https://sellfy.com/p/hU6S/ Product Description First page 1. Internet Acceptable Use and Regulation Policy PaperClass: Telecom Law and Regulation NETW 584 WEEK 7 COURSE PROJECT COMPLETE FINAL PAPER Purchase here https://sellfy.com/p/hU6S/ Product Description First page 1. Internet Acceptable Use and Regulation Policy PaperClass: Telecom Law and Regulation NETW 584 WEEK 7 COURSE PROJECT COMPLETE FINAL PAPER Purchase here https://sellfy.com/p/hU6S/ Product Description First page 1. Internet Acceptable Use and Regulation Policy PaperClass: Telecom Law and...

Words: 288 - Pages: 2

Premium Essay

Defining an Excceptable Use Policy

...CNG-132 Defining and Acceptable Use Policy Acceptable Use Policy An Acceptable Use Policy (AUP), acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager of a network, website, service, or large computer system that restrict the ways in which the network, website or system may be used. AUP documents are written for corporations, businesses, universities, schools, internet service providers, and website owners, often to reduce the potential for legal action that may be taken by a user, and often with little prospect of enforcement. The acceptable use policy (AUP), To fully explain the acceptable use policy would mean to start from the beginning, the user domain. The user domain is the employee or people within an organization who is granted access to the information system for the organization. There are roles and tasks, responsibility, and accountability that go into an acceptable use policy for the user domain. Within the user domain is the access of LAN to WAN, web surfing, and internet. LAN to WAN is the activities between and firewall LAN to WANs, routers, intrusion, detection, and workstations. Web surfing determines what a user can do on company time with company resources. Internet is when the user has access to the internet what types of controls should the organization have on the certain internet sites being accessed. Although they seem to be alike they are their own entity. The LAN to WAN acceptable use Policy will go hand in hand...

Words: 411 - Pages: 2

Premium Essay

Why Establish an Acceptable Use Policy?

...Establish an Acceptable Usage Policy?| | By| Stephen Lyons| | | | Background For the Past 15 years, I have been supporting small businesses with computer problems, ranging from desktop support to network and server integration. I have been a Microsoft® Certified Professional since 1999, and a Microsoft® Certified Small Business Specialist for over a year. I ran my own company, Lyons Den Computer Services, Inc., from 1992-2007. I exclusively serviced businesses with 3-25 workstation and servers. I recently started a new position where I am working with even larger organizations, with over 100 computers per location. One thing most of these companies have in common is a great dependence on technologies such as the internet, email and network connections to the world. Unfortunately, another thing they have in common is a lack of understanding of the depth of security concerns they create by taking advantage of these technologies. One of the largest security holes is often not a missing piece of hardware or software, but a missing piece of documentation that should be in place to protect their investment in all their equipment, personnel and good company name. I am referring to an Acceptable Use Policy for their network and Internet usage. Purpose I intend to show company management just how important this document can be, and why they need one, as well as the importance of keeping it updated. I will show examples of problems a lack of policy can create, and...

Words: 2455 - Pages: 10

Premium Essay

Nt2580 Unit 4 Assignment 2

...Dallas Page July 17, 2015 Unit 4 Assignment 2 NT2580 Acceptable Use Policy Definition 1. Overview To protect the integrity, confidentiality and accessibility along with the safety of our clientele and employees it is necessary that a precise set of standards must be defined for anyone who utilizes the electronic devices to access information via the internet. Richman Investments is committed to protecting employees, partners and the company from illegal or destructive actions whether knowingly or unknowingly. Internet or Intranet related systems, including but not limited to the World Wide Web, storage media, operating systems, network accounts and electronic mail are intended to be used for business pertaining to Richman Investments. It is the responsibility of each electronic device user to know the guidelines of the Acceptable Use Policy and to adhere to the Acceptable Use Policy of Richman Investments. 2. Purpose To outline and give a clear precise definition of what is and what isn’t acceptable when using the property of Richman Investments. Property including but not limited to computers, internet service, email service, storage media, operating systems or network accounts. Inappropriate use of either of the aforementioned exposes Richman Investments to legal liability and/or risks of damage to company hardware and/or software. 3. Scope The Acceptable Use Policy applies to all employees, contractors, clients, visitors and partners to...

Words: 689 - Pages: 3

Premium Essay

Cis 462 Wk 2 Case Study 1 Acceptable Use Policy

...CIS 462 WK 2 CASE STUDY 1 ACCEPTABLE USE POLICY To purchase this visit here: http://www.activitymode.com/product/cis-462-wk-2-case-study-1-acceptable-use-policy/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 462 WK 2 CASE STUDY 1 ACCEPTABLE USE POLICY CIS 462 WK 2 Case Study 1 - Acceptable Use Policy An Acceptable Use Policy (AUP) is a very important policy within organizations to define acceptable employee behavior when accessing company resources. Additionally, there are also legal implications within AUPs. Use an existing AUP that you are familiar with, such as from a current or previous workplace, or search on the Internet for an example AUP to complete this case study. Write a three to five (3-5) page paper in which you: 1. Describe the purpose of an Acceptable Use Policy you have selected and explain how the AUP helps provide confidentiality, integrity, and availability within the organization. 2. Critique the AUP you selected and provide recommendations for improving the AUP. 3. Explain methods that organizations can implement to help ensure compliance with the AUP, mitigate their risk exposure, and minimize liability. Describe how your selected AUP accomplishes these goals. More Details hidden... Activity mode aims to provide quality study notes and tutorials to the students of CIS 462 WK 2 Case Study 1 Acceptable Use Policy in order to ace their studies. CIS 462 WK 2 CASE STUDY 1 ACCEPTABLE USE POLICY To purchase this visit here: http://www.activitymode...

Words: 688 - Pages: 3

Premium Essay

Acceptable Use Policy

...Richman Investments ACCEPTABLE USE POLICY Information Security Policy Number 12345 Effective 10/15/2013` I. Introduction An Acceptable Use Policy (AUP) is an organization-wide policy that defines what is allowed and what is not allowed regarding use of Information Technology (IT) assets by employees. The following policy is to be followed by all employees of Richman Investments, authorized individuals, vendors, and contractors who use any information technology (IT), electronic, or communication devices owned and/or provided by Richman Investments for the purpose of assisting them with their job-related duties. Access to the Internet is a privilege and all employees must adhere to the policies regarding computer, email, and Internet usage. Violation of these policies will result in disciplinary and/or legal action that may include counseling, revocation of company devices, termination of the employee, and legal action. II. Roles and Responsibilities Every employee must acknowledge that they have received a copy of the AUP and confirm that they have a complete understanding and agree to abide by the rules set forth in the AUP. Receipt and signing of the AUP will occur at Employee Orientation, and in the event of changes to the policy, a revised AUP must be signed. III. Policy Directives A. Acceptable Use Management Requirements A Standard Operating Procedure (SOP) will be established to support the development and maintenance of this AUP. ...

Words: 747 - Pages: 3

Free Essay

Acceptable Use Policy

...21st Century Safety in Schools Connie Holden Eastern New Mexico University 21st Century Safety in Schools The Internet is a tool for both educators and students. Just as with any tool, especially power tools, we need to read safety precautions before using it. A person who uses a power tool without reading safety guidelines first takes a chance of getting hurt. Although using the Internet may not be physically harmful there still needs to be a set of safety guidelines to adhere to. In 2000 Congress enacted The Children’s Internet Protection Act (CIPA) to address this safety. CIPA imposes that all schools and libraries that receive Internet services at a discounted rate follow certain guidelines to help keep students safe while online. In order to continue receiving the discounted rate schools and libraries must certify that they have an Internet safety policy that includes technology protection measures. Websites that are obscene, contain child pornography, or are harmful to minors must be either blocked or filtered. The policy that schools use is The Acceptable Use Policy (AUP). The Acceptable Use Policy outlines rules regarding internet use so that the students, and staff, are protected. It must address a number of issues including personal safety, illegal activities, system security, privacy, plagiarism, copyright infringement and access to inappropriate materials. In addition, it should make it clear to the student that the school’s technology property is to...

Words: 601 - Pages: 3

Premium Essay

Internet and Email Aups

...E-mail Acceptable Use Policy Purpose E-mail is a critical mechanism for business communications at Richman Investments. However, use of Richman Investments’ electronic mail systems and services are a privilege, not a right, and therefore must be used with respect and in accordance with the goals of Richman Investments. The objectives of this policy are to outline appropriate and inappropriate use of Richman Investments’ e-mail systems and services in order to minimize disruptions to services and activities, as well as comply with applicable policies and laws. Scope This policy applies to all e-mail systems and services owned by Richman Investments, all e-mail account users/holders at Richman Investments (both temporary and permanent), and all company e-mail records. Account Activation/Termination E-mail access at Richman Investments is controlled through individual accounts and passwords. Each user of Richman Investments’ e-mail system is required to read and sign a copy of this E-mail Acceptable Use Policy prior to receiving an e-mail access account and password. It is the responsibility of the employee to protect the confidentiality of their account and password information. All employees of Richman Investments will receive an e-mail account. E-mail accounts will be granted to third-party non-employees on a case-by-case basis. Possible non-employees that may be eligible for access include: • Contractors. • Employees. • Interns. Applications for these temporary...

Words: 1904 - Pages: 8

Premium Essay

Acceptable Use Policy

...Acceptable Use Policy or AUP is a written policy and an agreement that defines what is allowed and not allowed to be used by employees regarding the use of internet. Here at Richman Investment are giving you, the employees the details and what the policy entails. The use of the Internet is a privilege, not a right, and inappropriate use will result in a cancellation of those privileges. The purpose of the internet resources is to help employees in the performance of their job related functions and not for personal usage. Each employee that is given privileges will have to comply with the company’s policy. Internet usage should be conducted for the company business only. Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information. The use of personal internet must be limited and only to be used for web based emails only with the approval of your Supervisor or Manager. Under no circumstances may Company network to be used on Social networking such as Facebook, or video viewing such as you tube, pornographic, or any unethical use. These websites will be restricted and prohibited for viewing. Doing so can lead to disciplinary action up to and including termination of employment. Like the internet, email should also be for Company purposes only. Any employees are not allowed to send personal emails using Company email...

Words: 576 - Pages: 3

Premium Essay

Acceptable Use Policy

...Assignment: Create an Internet and Email Acceptable Use Policy Course Foundations of Computer security Instructor: Amanda Lawrence Cooley Investments is an organization based upon client trust and confidentially. Without the trust placed in the organization by the clients, the organization will cease to exist. As such, every employee should consider their daily actions and the correlation of those actions to the trust placed in the company by the clients. Just as “Employee Smith” would safeguard his home computer against a malware attack, so should he protect the company’s computer from a malware attack. The following will outline the acceptable use of Cooley’s assets regarding Internet and email access and the actions that are prohibited. Cooley Investment’s computers, computer files, e-mail system, Internet access and any software furnished to employees are company property and subject to monitoring and unannounced review. They are to be used for company business only, and not for excessive personal use to communicate with friends or family or to access the Internet for personal purposes. While use of the computer, e-mail and Internet is intended for job-related activities, incidental and occasional brief personal use is permitted within reasonable limits so long as it does not interfere with the employee's work. The company specifically prohibits the use of computers (including Internet access) and the e-mail system in ways that are disruptive, offensive to...

Words: 805 - Pages: 4

Free Essay

Develop an Organizaion Wide Policy Framework Implementation Plan

...IS4550: Security Policies and Implementation Mr. Shane Stailey Edy Ngou Date: 09/20/2015 Lab week 1: Organization Wide Security management AUP worksheet ABC Credit Union Acceptable Use Policy Policy Statement The acceptable Use Policy is to ensure compliance with laws such as the Gramm-Leach-Bailey Act (GLBA) and the Federation trade commission (FTC). This policy is also to assist the Credit Union ensuring information technology (IT) security best practices with regard to it associates. Purpose / Objective The purpose of ABC Credit Union’s acceptable use policy is to define requirements for Credit Union acceptable use policies, and define the acceptable and unacceptable uses of computer equipment, internet / intranet / extranet related systems, and email by ABC Credit Union associates in the performance of their duties. This policy requires that all Credit Union electronic information systems be used for Credit Union business with minor exceptions. These rules are in place to protect the associates and ABC Credit Union. These objectives of this policy are: * To keep the business process in a high working order in order to achieve the maximum amount of profit gained. * To keep morale law, so that employees are constantly being replaced. Scope This policy applies to associates, contractors, consultants, and other workers at ABC Credit Union, including all personnel affiliated with third parties. Also this policy applies to all...

Words: 461 - Pages: 2

Free Essay

Test

...Acceptable IT Usage Policy Acceptable IT Usage Policy Capgemini India The information contained within this document is the property of CAPGEMINI INDIA and is issued in confidence and must not be reproduced in whole or in part. Acceptable IT Usage Policy Document Control Revision History Date Version 8th June 2004 ISMS-Annex04/1.0 1.1 Author C. Rai – ISMS Manager C. Rai – ISMS Manager Description FIRST RELEASE Second Release – Revision of earlier release to adapt QMS guidelines on document controls and classification standard Control 3.9 – “network” was replaced with “network server” Addition of control 3.19 “Network access to temporary staff and visitors” under section 3 Addition of SECTION 8 “Mobile computing and Teleworking Policy” SECOND RELEASE Changes in software copyright compliance, Internet policy, maintaining information security, password policy. THIRD RELEASE Addition of acceptable use policy on Data Card / GPRS / Blackberry 15th Jan 05 28th Jan 05 1.2 C. Rai – ISMS Manager 12th Feb 05 1.3 CRAI – ISMS Manager 3rd March 05 2.0 CRAI – ISMS Manager Chandrashekhar Moharir – ISMS Team 27th September 2.1 05 4th Oct 06 18th 08 3.0 Cmoharir- ISMS team Dmalli- ISMS Team September 3.1 19th September 3.1 09 22nd April 2010 3.2 Company Confidential Kamal Seepana- ISMS No changes Team Daksha Malli Policy Revision Page 2 of 20 Printed copies are current on distribution date. Always refer to the electronic...

Words: 5081 - Pages: 21

Premium Essay

Richman Investments

...Officer From: IT Consultant Subject: Acceptable Use Policy (AUP) Greetings RI Security Officer, Richman Investments expresses the acceptable and unacceptable use of the Internet and e-mail access. The following report will address the “Acceptable Use Policy” (AUP) standard at Richman Investments. All users of Richman Investments agree to and must comply with this Acceptable Use Policy (AUP). Richman Investments does not control or review the content of any Web site. However, Richman Investments may block or remove any materials that, in Richman Investments sole discretion, may be illegal, or which may violate this AUP. Richman Investments may cooperate with legal authorities and/or third parties in the investigation of any suspected or alleged crime or civil wrong. Violation of this AUP may result in the suspension or termination of either access to the Services and/or Richman Investments account or other actions as deemed appropriate. User Responsibilities: These guidelines are intended to help you make the best use of the Internet resources at your disposal. You should understand the following. 1. Richman Investments provides Internet access to staff to assist them in carrying out their duties for the Company. It is envisaged that it will be used to lookup details about suppliers, products, to access client information and other statutory information. It should not be used for personal reasons. 2. You may only access the Internet by using the Richman Investments content...

Words: 621 - Pages: 3