Acceptable Use Policy

Great Essays
Acceptable Use Policy
This acceptable use policy (AUP) can be found in the User Domain and is what is used to define what users are allowed and not allowed to do with Organization owned IT assets. It is designed to protect Richman, its employees, customers and partners from harm caused by misuse of LAN to WAN, internet and web surfing. Misuse includes anything that is deliberate as well as inadvertent actions (Kim & Solomon, 2014). Everyone that works for Richman is responsible for the security of our system and the data that is on it. As such, it is the responsibility of all employees to ensure that they adhere to the guidelines in this policy at all times. If for any reason, the employee feels that a portion of the policy is unclear
…show more content…
Definitions
“Users” is classified as everyone who has immediate access to any of Richman’s IT systems. Included in this description would be permanent employees, temporary employees, customers, contractors and business partners (Example Acceptable Use Policy for IT Systems, 2016).
“Systems” refers to all IT equipment that directly connects to our corporate network and all equipment that has access corporate applications. This includes, but is not limited to, desktop computers, laptops, smartphones, tablets, printers, data and voice networks, networked devices, software, electronically-stored data, portable data storage devices, third party networking services, telephone handsets, video conferencing systems, and all other similar items commonly understood to be covered by this term (Example Acceptable Use Policy for IT Systems, 2016).
3. Scope
This Policy is universal and applies to all Users and Systems. In certain instances, some Users or Systems are geared to more specific policies that are affixed to certain areas where conflict may arise (Example Acceptable Use Policy for IT Systems,
…show more content…
The confidentiality of information In the system cannot be guaranteed except for the areas that are required by law.
The IT Systems of Richman serve the sole purpose of supporting and enabling the organization business practices. A small amount of personal use is allowed, as long as they conform to proper use guidelines. Personal use cannot be detrimental to the users’ productivity or the productivity of their colleagues. Also, the personal use of the system must not cause Richmond to take on any costs which are not trivial in size. (Example Acceptable Use Policy for IT Systems, 2016).
Richman trusts that its employees will be fair and sensible when judging what constitutes an acceptable level of personal use of the company’s IT systems. If employees are uncertain they should consult their manager.
Any and all information that is on the system which may be sensitive in nature, must be encrypted and stored securely so there is no unauthorized access to the information. The accomplishment of this should be done in a way that does not prevent authorized users from being able to access the information. (Example Acceptable Use Policy for IT Systems,

Related Documents

  • Great Essays

    Nt1330 Unit 1 Assignment 1

    • 1566 Words
    • 7 Pages

    To prevent unauthorized devices, and company devices that do not meet the requirements specified in the Network Health…

    • 1566 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Yoely Brach Case Summary

    • 1247 Words
    • 5 Pages

    Honorable Judge Schmidt: We are confused and baffled by Isaac Oberlander’s demands and ultimatums. Firstly, let us set the record straight: Yoely Brach (“Yoely”) is the defendant and should not dictate the terms of any arbitration proceedings. The fact remains that Mr. Jacob Guttman, the owner of Court Street Office Supplies, Inc. (“Company”), employed Yoely – right out of Kollel with no formal or general education – out of kindheartedness and compassion to his son-in-law. As Yoely mistook his father-in-law’s unselfishness for weakness, he engaged in erratic behavior, breached his fiduciary duties to the Company, and embezzled the Company by hundreds of thousands of dollars.…

    • 1247 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Case Study 1 AIT 652 Sache Bond Executive summary: Towson University is responsible for complying with both Federal and Maryland state laws. It is essential that all employees are aware that the proper procedures must be followed to ensure that the legal action remains unrevised once the legal hold notice is issued. The legal holds notice will inform all necessary employees of their new profound obligation as an employee. The notice refers you to the policy written on the legal hold notices. The guidance of the legal holds notice supersedes all other retention policy guidelines (Records).…

    • 1033 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Est1 Task 5.2

    • 972 Words
    • 4 Pages

    5.0 Enforcement 5.1 Should an employee be in violation of Health and Safety Policies and/or Procedures, disciplinary action will be taken in accordance with the General Pipe Disciplinary Policies and Procedures. 5.2. General Pipe expects all supervision including foremen, general foremen, superintendents and management to equally participate in correcting unsafe acts and conditions and in enforcing discipline throughout the company. It is the duty and obligation of supervision to do all jobs within safety and health guidelines. 5.3 Disciplinary action shall be taken as a result of safety violations.…

    • 972 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Cost Benefit Analysis

    • 1774 Words
    • 7 Pages

    Choosing the appropriate EMR (electronic medical record) vendor is essential to a successful transition from paper records to electronic medical records. Many factors must be weighed in this selection process. One method to help hospitals and practices make this complex decision is to complete a cost-benefit analysis. Entire books have been written on how to conduct cost-benefit analysis and an in-depth analysis goes well beyond the scope of this paper. Instead, this discussion will focus on how cost-benefit analysis can help to determine an appropriate EMR vendor.…

    • 1774 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Ethical Man Month Essay

    • 637 Words
    • 3 Pages

    Question 1: Using The Mythical Man Month reading found on the course homepage, read the project problems mentioned in the text. List the difficulties and errors that occurred in these failed programming projects. In the Mythical Man reading the difficulties and errors that occurred include;  Time complexity  As input increases, Output decreases  Communication Barriers  High cost…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The use of technology can significantly save costs and improve products quality in an organisation, which can help Full Bloom. Full Bloom operate in a very competitive business environment, competing not only with other florist shops but also with supermarkets and convenience stores. In addition, they have to deal with the threat of substitute products such as trendier technological gifts or other cheaper kinds of gifts that can be mass produced at a lower cost. A strategy that can help Full Bloom accomplish their vision while addressing their competitors and challenges is using competiveness advantage. Competiveness advantage is the ability of the organisation to sell goods and services better than its competitors.…

    • 526 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Question: Question 12 Answer: Staff Policies and procedures are there to ensure staffâ€TMs health and welfare are protected and that there rights are supported. Some policies…

    • 613 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Why Collect HR Data

    • 1110 Words
    • 5 Pages

    Data Protection Act This act applies to all organisations that process data relating to their staff and customers. It is the main legal framework in UK that protects personal data. The act contains 8 data protection principles which are: Personal data should be processed fairly and lawfully, this can be achieved by asking the employees to use their information, on the employment contract.…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Discussions: Several discussions, debates were going on supporting and opposing net neutrality. There are advantages and disadvantages regarding this. Several regulations are also brought w.r.t protect net neutrality, but bigger corporations are still trying to oppose this free and open access of internet. Advantages and disadvantages are discussed below: Advantages: 1) No Limitations: There are no limitations on internet service usage other than the limitations proposed by the government.…

    • 828 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Body Worn Police Cameras

    • 1430 Words
    • 6 Pages

    C. Perceived Risks of Body-Worn Camera Programs Body-worn cameras are a very new technology. With every new technology, there are risks that threaten the success and effectiveness of the technology. The use of body-worn cameras has produced concerns of citizen’s privacy, officer privacy, and investments and costs of creating and maintaining programs. Citizen privacy is the biggest concern regarding body-worn camera programs. Body- worn cameras have the potential to infringe on citizens’ expectation of privacy.…

    • 1430 Words
    • 6 Pages
    Superior Essays
  • Brilliant Essays

    The next best practice is information management. The author believes that technology is not the answer but an enabler for companies to manage their information as an asset. The main purpose of managing information as an asset is to benefit the customer. "There has to be a sustained commitment to change attitudes and behavior if technology is going to help in leveraging information assets for the benefit of the customer." (Unruh, 1997)…

    • 3010 Words
    • 13 Pages
    Brilliant Essays
  • Great Essays

    Introduction In the modern world, the word “smart” is used everywhere from homes, to the schools, hospitals, market and businesses-to mention but just a few. Generally, people have come to love the word smart and want to be smart or even have smart items with them. Parents would want their children to be smart; people want to buy smart products like the Smartphone. The reality is that, you cannot avoid smart products in the modern world.…

    • 977 Words
    • 4 Pages
    Great Essays