Acceptable Use Policy

Improved Essays
Executive Summary
This policy draft covers the acceptable use policy for information technology including the purpose, scope, rights and responsibilities, and acceptable practices. It describes the policy that will govern employees while using the computers and computer systems as provided the company. The second part of the policy will govern the employees while using their personal devices in the office and at home. This is meant to ensure that the integrity and security of the data are not compromised. Finally, the draft covers the policy on digital media sanitization, reuse, and destruction policy to ensure that exhausted information systems are safely discarded or donated for reuse.
Approval Draft for:
• Acceptable Use Policy for Information Technology
• Bring Your Own Device Policy
• Digital Media Sanitization, Reuse, & Destruction Policy

1. Acceptable Use Policy for Information Technology
Purpose
…show more content…
As an employee of clay renovations, you have access to valuable information pertaining to your area of operations and as well general information that is accessed by all users. As a result, you have a responsibility to act in a manner that is compliance with ethical and legal requirements. As a user, you are responsible for ensuring that the rights of other users are respected, the information that is stored in the computer systems is protected from third party breaches, licenses, and the physical facilities are respected. Any violation of the above requirements could lead to termination of employment or legal actions as the management may deem fit. The users are thus required to familiarize themselves with the laws that govern the use of information

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Media information systems should be controlled and physically protected to prevent damage to assets and interruption to business activities. Appropriate procedure should be established to protect documents, computer media, the data input / output and documented system from damage, theft and unauthorized access. 7. Attention should be given to protect the integrity of electronically published information to prevent modifications that may harm the company's reputation. The information provided to the public, such as information on the web that can be accessed via the internet must be in accordance with the laws, rules, and regulations in the jurisdiction 8.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Employees are responsible for maintaining the information that may reside on various storage platforms utilized at the university, to include emails, databases, text files, pdf files, computer usage logs, and other…

    • 1033 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Being a healthcare company HCR ManorCare is very careful on its wording when it comes to the codes listed previously and communication because it wants everyone to be aware that ANY type of violation in the key points above may lead to termination. I believe even though HCR ManorCare doesn’t lists all types of communication (i.e. desktops, laptops, iPhone, tablets etc.) they specifically ensure that they specify and written, verbal, and electronic belongs to HCR ManorCare and any information disclosed improperly without authority can result in legal action against the Company and the employee. HCR ManorCare doesn’t spend a hefty amount of time on ethics in communication as the key points above are also ethically driven and address all aspects of the company, not just…

    • 1130 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Any organization, including ABC healthcare Information technology (IT) infrastructures are exceedingly powerless against potential assaults or harm caused from internal and external threats. Meeting standardize compliance requirements developed by the Sarbanes-Oxley (SOX) Act and the Health Insurance Portability and Accountability Act (HIPAA) is critical to reduce potentials assaults to guarantee their infrastructures are secure to the best degree possible by substituting data frameworks regulations. Technical security recommendations to improve ABC Healthcare information security can enhance their information security without significantly increasing management or cause difficulty in the organization. Healthcare industries store and have…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Thomas Marsden provide companies with multiple services to make their company better, look more professional and succeed in their respective industries. Government regulations on plagiarism and copy right must be followed by the company at all times, they also must abide by the Can Spam Act 2003. These are the main government legislations followed by the company. Overall the company offer six different services ranging from branding to advertising. These services include: • Branding, this service allows clients to better their company through strategies that Thomas Marsden believes will drastically improve their company.…

    • 1842 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    The security policies should outline what employees are expected of in regards to complying with the security policies and the consequences…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Rawlinson Road Case Study

    • 1325 Words
    • 6 Pages

    I. School Type: Rawlinson Road Middle School II. Faculty/Staff and Student Acceptable Use Policy A. General Information 1. At Rawlinson Road Middle School, technology use is a not a right, but rather a privilege. As such, administrators, staff, parents, and students must be appropriately trained in regards to technology use at Rawlinson Road. 2. Anyone who utilizes the technology resources available at Rawlinson Road must be aware of and comply with ALL of the requirements listed in Section B below.…

    • 1325 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    1.Does Kennesaw State University have any computing ethical policy for computer usage? If so what is it? Kennesaw State University’s Computer Usage Policy outline acceptable use of university computers and resources. Guide line 11, “No one shall misrepresent his or her identity or relationship to the University when obtaining or using University computer or network privileges”, is one example of the ethical guide lines outline by this policy. 2.Thinking about your cell phone - do you believe there are any ethical problems with being able to take pictures and/or videos with your cell phone (such as at concerts, historic sites, etc.)…

    • 225 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Employees shall not make unauthorized commitments or promises of any kind purporting to bind the department or agency. 9. Employees shall conserve and protect state property and equipment and not use it for unauthorized purposes. Employees shall comply with the State’s Acceptable Use Policy governing use of computers, email and network…

    • 945 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Utilitarianism In Library

    • 1994 Words
    • 8 Pages

    Sometimes, making decisions becomes difficult especially when multiple people are at stake. Lauren, a librarian at Wentern Public Library knows this all to well. One day, while working she was approached by David, a patron who was looking for internet links on the water supply. He continually made Lauren uneasy because David was nervous, flustered, and acting suspicious. He asked Lauren for sources on chemicals in water and the public water system.…

    • 1994 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Texting In Nursing

    • 1129 Words
    • 5 Pages

    If organizations are going to implement the use of smartphones and tablets, policies and procedures must be in place to inform and protect the user and the patients. In addition, it is recommended the policies routinely be reviewed by executives, risk management and legal counsel to ensure adequate coverage and to ensure appropriate implementation. Another suggestion is the use of password protection phones/tablets to secure confidential…

    • 1129 Words
    • 5 Pages
    Improved Essays
  • Brilliant Essays

    The next best practice is information management. The author believes that technology is not the answer but an enabler for companies to manage their information as an asset. The main purpose of managing information as an asset is to benefit the customer. "There has to be a sustained commitment to change attitudes and behavior if technology is going to help in leveraging information assets for the benefit of the customer." (Unruh, 1997)…

    • 3010 Words
    • 13 Pages
    Brilliant Essays
  • Improved Essays

    Workstation Security Policy A workstation policy provides standards for access to information inside the facility in a controlled manner, respecting guidelines set by the Health Insurance Portability and Accountability Act (HIPPA). The purpose of this policy is to provide guidelines to properly ensure workstation security within healthcare companies. Workstation security policy ensures the security of information on the workstation and information accessed by the workstation. Additionally, this policy provides guidelines on how to ensure that the requirements of HIPPA are met.…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Acceptable Use Policy

    • 552 Words
    • 3 Pages

    Acceptable Use Policy: This policy outlines the acceptable use of TIJONCORE computer equipment. This policy also applies to the use of TIJONCORE information and electronic equipment owned by TIJONCORE, and network resources that are used to handle TIJONCORE business. Internet, Intranet, software, operating systems, network accounts, and email accounts are the property of TIJONCORE. These systems are not to be used for personal affairs, but for business purposes only.…

    • 552 Words
    • 3 Pages
    Great Essays