...Acceptable Use Policy or AUP is a written policy and an agreement that defines what is allowed and not allowed to be used by employees regarding the use of internet. Here at Richman Investment are giving you, the employees the details and what the policy entails. The use of the Internet is a privilege, not a right, and inappropriate use will result in a cancellation of those privileges. The purpose of the internet resources is to help employees in the performance of their job related functions and not for personal usage. Each employee that is given privileges will have to comply with the company’s policy. Internet usage should be conducted for the company business only. Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information. The use of personal internet must be limited and only to be used for web based emails only with the approval of your Supervisor or Manager. Under no circumstances may Company network to be used on Social networking such as Facebook, or video viewing such as you tube, pornographic, or any unethical use. These websites will be restricted and prohibited for viewing. Doing so can lead to disciplinary action up to and including termination of employment. Like the internet, email should also be for Company purposes only. Any employees are not allowed to send personal emails using Company email. Use Company...
Words: 576 - Pages: 3
...Use Policy or AUP is a written policy and an agreement that defines what is allowed and not allowed to be used by employees regarding the use of internet. Here at Richman Investment are giving you, the employees the details and what the policy entails. The use of the Internet is a privilege, not a right, and inappropriate use will result in a cancellation of those privileges. The purpose of the internet resources is to help employees in the performance of their job related functions and not for personal usage. Each employee that is given privileges will have to comply with the company’s policy. Internet usage should be conducted for the company business only. Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information. The use of personal internet must be limited and only to be used for web based emails only with the approval of your Supervisor or Manager. Under no circumstances may Company network to be used on Social networking such as Facebook, or video viewing such as you tube, pornographic, or any unethical use. These websites will be restricted and prohibited for viewing. Doing so can lead to disciplinary action up to and including termination of employment. Like the internet, email should also be for Company purposes only. Any employees are not allowed to send personal emails using Company email. ...
Words: 307 - Pages: 2
...establish guidelines and norms for the organization with respect to the use of email, and any other electronic communication medium, for internal and external communications. Make recommendations on what to do and what not to do. Explain the reasoning for your recommendations. (10 marks) WILSON BROTHERS LIMITED Guidelines for Best Practices in Electronic Communications This document will serve as a guideline on the use of electronic communications and addresses major issues such as; email and cell phone usage, best practices, how we define appropriate use of email and cell phones in the workplace, the effective use of email as a business tool for internal and external communication and how it is to be managed. This policy applies to all Wilson Brothers Limited Employees. Important Factors to Note: Email is not guaranteed to be private. Email is not an appropriate substitute for face-to-face in specific situations. Email is not always sent and received instantly; messages can arrive several hours or days after they are sent. As a result, email is not an appropriate method for exchanging time-sensitive information. Emails are considered to be company records. Therefore, they should be retained in the same way as Wilson Bros does customer/sales records or other forms of communication, such as letters, faxes Risks Associated to using Email include: The privacy and security of email communication cannot be guaranteed. It is impossible to verify the true...
Words: 1777 - Pages: 8
...Updated: August 2013 CONTENTS Page No. 1. 2. 3. 4. 5. 6. 7-8. 9. 10. 11-12. 13. Introduction Access to Systems and Services Internet Access Virus Protection Email and Moodle Use Tips for Safe Web Surfing Acceptable Use Policy for Network Access Health and Safety Tips Access to Data and Information Online Safety Information Security Policy Statement STUDENTS WORK You are responsible to backup current work and keep it safe. Work should be backed up to a pen drive on-line service such as you college Sky drive account. INTRODUCTION 1 The purpose of information security management is to preserve: Confidentiality: data and information can only be seen by those authorised to see it and can only be changed by those allowed to change it Integrity: data is complete, accurate, up to date and relevant and the system is operating as per the specification information and services are delivered to the right person when they are needed Availability: Accountability: all activity can be traced back to the originator The College recognises that staff and students will require access to systems, services and data in order to fulfil their roles and responsibilities. Therefore, appropriate procedures and controls will be put in place to enable staff and students to obtain the necessary authorised access so that they are able to carry out their work effectively and efficiently. The College also recognises that all staff and students are required to comply with the necessary...
Words: 2825 - Pages: 12
...Travis Avery NT2580 Project Part 2 Purpose - This policy defines the security configurations users and Information Technology (IT) administrators are required to implement in order to ensure the integrity, availability, and confidentially of the network environment of Richmond Investments(R.I). It serves as the central policy document with which all employees and contractors must be familiar, and defines regulations that all users must follow. The policy provides IT managers within R.I. with policies and guidelines concerning the acceptable use of R.I. technology equipment, e-mail, Internet connections, network resources, and information processing. The policies and restrictions defined in this document shall apply to all network infrastructures and any other hardware, software, and data transmission mechanisms. This policy must be adhered to by all R.I. employees, temporary workers and by vendors and contractors working with R.I. Scope- This policy document defines the common security requirements for all R.I. personnel and systems that create, maintain, store, access, process or transmit information. This policy also applies to information resources owned by others, such as vendors or contractors of R.I., in cases where R.I. has a legal obligation to protect resources while in R.I. possession. This policy covers all of R.I. network systems which are comprised of various hardware, software, communication equipment and other devices designed to assist the R.I. in the creation...
Words: 598 - Pages: 3
...Updated: August 2013 CONTENTS Page No. 1. 2. 3. 4. 5. 6. 7-8. 9. 10. 11-12. 13. Introduction Access to Systems and Services Internet Access Virus Protection Email and Moodle Use Tips for Safe Web Surfing Acceptable Use Policy for Network Access Health and Safety Tips Access to Data and Information Online Safety Information Security Policy Statement STUDENTS WORK You are responsible to backup current work and keep it safe. Work should be backed up to a pen drive on-line service such as you college Sky drive account. INTRODUCTION 1 The purpose of information security management is to preserve: Confidentiality: data and information can only be seen by those authorised to see it and can only be changed by those allowed to change it Integrity: data is complete, accurate, up to date and relevant and the system is operating as per the specification information and services are delivered to the right person when they are needed Availability: Accountability: all activity can be traced back to the originator The College recognises that staff and students will require access to systems, services and data in order to fulfil their roles and responsibilities. Therefore, appropriate procedures and controls will be put in place to enable staff and students to obtain the necessary authorised access so that they are able to carry out their work effectively and efficiently. The College also recognises that all staff and students are required to comply with the necessary...
Words: 2825 - Pages: 12
...Updated: August 2013 CONTENTS Page No. 1. 2. 3. 4. 5. 6. 7-8. 9. 10. 11-12. 13. Introduction Access to Systems and Services Internet Access Virus Protection Email and Moodle Use Tips for Safe Web Surfing Acceptable Use Policy for Network Access Health and Safety Tips Access to Data and Information Online Safety Information Security Policy Statement STUDENTS WORK You are responsible to backup current work and keep it safe. Work should be backed up to a pen drive on-line service such as you college Sky drive account. INTRODUCTION 1 The purpose of information security management is to preserve: Confidentiality: data and information can only be seen by those authorised to see it and can only be changed by those allowed to change it Integrity: data is complete, accurate, up to date and relevant and the system is operating as per the specification information and services are delivered to the right person when they are needed Availability: Accountability: all activity can be traced back to the originator The College recognises that staff and students will require access to systems, services and data in order to fulfil their roles and responsibilities. Therefore, appropriate procedures and controls will be put in place to enable staff and students to obtain the necessary authorised access so that they are able to carry out their work effectively and efficiently. The College also recognises that all staff and students are required to comply with the necessary...
Words: 2825 - Pages: 12
...Employee Privacy Report • Write a 1,050- to 1,200-word report addressing e-mail, Internet use, and privacy policies. Answer the following questions in your report: o What are the e-mail use, Internet use, and privacy policies at your job? The email policy at my job at the Florida Foundation for Families (hereinafter “FFF”) are that work email is strictly to be used for work purposes and not for personal use. The policy is covered in our Employee Handbook, and states that the rationale for the policy is that we should only be working during work time, and that if we were to use work email for private use, it could expose the company to internet threats that would otherwise be easily avoidable. For instance, if we were to use email for private use and were to open an attachment that contained a virus, we could potentially jeopardize the entire system’s network. During our break periods and lunch we are allowed to use private email accounts, but we are likewise instructed not to open any attachments on our work computers in order to avoid the same threat that would be posed by using our private email accounts for such purposes. Like our email policy, the internet is supposed to only be used for work purposes as well, however, since work purposes aren’t strictly defined there is definitely more leeway in how we can use the internet, since we could be looking at an article in an online magazine or newspaper that’s work related. We are still forbidden from using any...
Words: 1131 - Pages: 5
...An internet usage policy provides employees with rules and guidelines about the appropriate use of company equipment, network and Internet access. Having such a policy in place helps to protect both the business and the employee; the employee will be aware that browsing certain sites or downloading files is prohibited and that the policy must be adhered to or there could be serious repercussions, thus leading to fewer security risks for the business as a result of employee negligence. The Internet Usage Policy is an important document that must be signed by all employees upon starting work. Below is a Sample Internet Usage Policy that covers the main points of contention dealing with Internet and computer usage. The policy can then be tailored to the requirements of the specific organization. Internet usage policy This Sample Internet Usage Policy applies to all employees of <company> who have access to computers and the Internet to be used in the performance of their work. Use of the Internet by employees of <company> is permitted and encouraged where such use supports the goals and objectives of the business. However, access to the Internet through <company> is a privilege and all employees must adhere to the policies concerning Computer, Email and Internet usage. Violation of these policies could result in disciplinary and/or legal action leading up to and including termination of employment. Employees may also be held personally liable for damages caused...
Words: 975 - Pages: 4
...about Google or Facebook’s privacy policies are front-page news. However, although it perhaps receives less attention, electronic workplace privacy is just as big an issue. Workers communicate at work using various devices. Some workers rely on a computer to send emails. Other workers may favor using a land phone or a cell phone for communication with important clients. In some cases, workers use texting on cell phones to communicate with fellow employees. The one similarity between all these workers is that they are all probably communicating on a device or on a network that belongs to the company that they work for. Workers are also likely to use work equipment, a computer or a company cell phone, to make personal calls. This makes sense, given the long hours that people often spend at work and the ease of using work machines to communicate. A recent article in The Economist, “Slaves to the Smartphone”, states “Employees find it ever harder to distinguish between ‘on-time’ and ‘off-time’—and indeed between real work and make-work.” Most electronic communication at work (whether via email, text, or otherwise) cannot be claimed as private. Employers have the right to monitor employees’ use of the Internet, the content of their emails, as well as other electronic communication.Of course, there are certain exceptions based on the state in which the employee resides and a number of other circumstances. For example, conversations held on personal phones are private in...
Words: 1674 - Pages: 7
...EQUAL EMPLOYMENT OPPORTUNITY POLICY STATEMENT Chattahoochee Construction Company is committed to equality of opportunity in employment. All employees and job applicants shall be treated equally without regard to race, color, religion, sex, medical condition (cancer), disability, veteran status, age (over 40), national origin, ancestry, or marital status in all employment practices including advertising, recruiting, interviewing, hiring, training, promotion, transfer, compensation, benefits, discipline, layoff, terminations, recalls and company-sponsored recreational programs. No questions regarding race, color, religion, sex, national origin, medical condition (cancer), ancestry, age (over 40), or marital status can be asked during the course of any interview. Questions regarding medical condition or physical handicap can be asked only in regard to the individuals’ ability to perform the essential functions of the job. Harassment based on these factors, and sexual harassment, will not be tolerated. Company-sponsored training, education, tuition assistance, and social or recreational programs will be administered without discrimination. No segregated facilities will be maintained, nor will employees be permitted to perform services at any location under Chattahoochee’s Construction Company control where segregated facilities are maintained. Further, it is Chattahoochee Construction Company’s policy to comply in all respects with the Civil Rights Act of 1964, Executive...
Words: 792 - Pages: 4
...Medical General Hospital Security Policy Introduction Information is an essential asset and is vitally important to Medical General Hospital business operations and long-term viability. Medical General Hospital must ensure that its information assets are protected in a manner that is cost-effective and that reduces the risk of unauthorized information disclosure, modification, or destruction, whether accidental or intentional. The Medical General Hospital Security Policy will adopt a risk management approach to Information Security. The risk management approach requires the identification, assessment, and appropriate mitigation of vulnerabilities and threats that can adversely impact Medical General Hospital information assets and patient records. Objectives • To keep all private patient files confidential • Allow only doctors and nurses access to private documents of patient • Setup username and passwords for employees • Setup badges for contactors and janitors • To comply with all security measures • To make sure private information about company files are prohibited • To make sure all printed documents that can be a threat to the company are shredded and not thrown in trash. • To make sure all staff shutdown workstation after using at the end of the day • To enforce that Surveillance cameras are monitored 24hrs a day 7days a week • To make sure visitors check in at the front before seeing the patient’s • Protect all data from unauthorized...
Words: 5676 - Pages: 23
...obligations. * Internet and digital firm techs make it easier to assemble, integrate and distribute info, unleashing new concerns about appropriate use of customer info, protection of personal privacy and protection of intellectual property * Other issues: establishing accountability, setting standards to safeguard system quality, and preserving values and institutions * 5 moral dimensions of the info age * Info rights and obligations individuals/firms possess in respect to themselves * Privacy – Claim of individuals to be left alone, free from surveillance/interference from other individuals, organizations, or the state; claim to be able to control info about yourself * Privacy in public spaces * Data storage & exchange * Laws & expectations in US Vs. EU & Australia * Protecting traditional intellectual property rights in digital society * Who is held accountable and liable for harm done to info and property rights * System quality: standards of data and system quality to protect individual rights * Quality of life: preservation of values in an info and knowledge based society * 4 technological trends of concern * Computing power doubles every 18 months Increased reliance on, and vulnerability to, computer sys * Data storage costs rapidly declining Multiplying database on individuals * Data analysis advances Greater ability to find detailed personal info on individuals * Networking advanced and the Internet Enables...
Words: 983 - Pages: 4
...Assignment: Create an Internet and Email Acceptable Use Policy Course Foundations of Computer security Instructor: Amanda Lawrence Cooley Investments is an organization based upon client trust and confidentially. Without the trust placed in the organization by the clients, the organization will cease to exist. As such, every employee should consider their daily actions and the correlation of those actions to the trust placed in the company by the clients. Just as “Employee Smith” would safeguard his home computer against a malware attack, so should he protect the company’s computer from a malware attack. The following will outline the acceptable use of Cooley’s assets regarding Internet and email access and the actions that are prohibited. Cooley Investment’s computers, computer files, e-mail system, Internet access and any software furnished to employees are company property and subject to monitoring and unannounced review. They are to be used for company business only, and not for excessive personal use to communicate with friends or family or to access the Internet for personal purposes. While use of the computer, e-mail and Internet is intended for job-related activities, incidental and occasional brief personal use is permitted within reasonable limits so long as it does not interfere with the employee's work. The company specifically prohibits the use of computers (including Internet access) and the e-mail system in ways that are disruptive, offensive to...
Words: 805 - Pages: 4
...Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users. INTRODUCTION From the year 2000 to 2010, the users’ on the Internet has escalated to approximately five times its original users. The Internet provides a variety of services in which its users transmits large amounts of proprietary and personal data. The increase in Internet users and the vital data transmitted has enticed criminals to use the internet to obtain vital information. This is done through the use of malicious traffic. Malicious traffic can be defined as Internet traffic used to compromise a system and/or to conceivably impair the privacy of consumers...
Words: 1930 - Pages: 8