Preview

Acceptable Use Policy

Good Essays
Open Document
Open Document
725 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Acceptable Use Policy
Richman Investments
ACCEPTABLE USE POLICY
Information Security Policy Number 12345
Effective 10/15/2013`
I. Introduction
An Acceptable Use Policy (AUP) is an organization-wide policy that defines what is allowed and what is not allowed regarding use of Information Technology (IT) assets by employees. The following policy is to be followed by all employees of Richman Investments, authorized individuals, vendors, and contractors who use any information technology (IT), electronic, or communication devices owned and/or provided by Richman Investments for the purpose of assisting them with their job-related duties. Access to the Internet is a privilege and all employees must adhere to the policies regarding computer, email, and Internet usage. Violation of these policies will result in disciplinary and/or legal action that may include counseling, revocation of company devices, termination of the employee, and legal action.
II. Roles and Responsibilities
Every employee must acknowledge that they have received a copy of the AUP and confirm that they have a complete understanding and agree to abide by the rules set forth in the AUP. Receipt and signing of the AUP will occur at Employee Orientation, and in the event of changes to the policy, a revised AUP must be signed.
III. Policy Directives

A. Acceptable Use Management Requirements
A Standard Operating Procedure (SOP) will be established to support the development and maintenance of this AUP. Richman Investments’ management team is responsible for keeping the AUP up to current standards and ensuring that new and current employees are kept abreast of major changes and that signatures are obtained from each employee following these changes. At a minimum, skills that should be included include annual User Training and Awareness. A formal review cycle will be established to review all Acceptable Use initiatives.
B. Ownership
Any electronic files created, sent, received, or stored under the



References: A. Richman Investment POLICY: Information Security. 2013. P 1-6. B. Information Technology Acceptable Use Policies and Procedures. 2013. P 1-8. C. Internet Usage Policy. 2013. P 1-2. V

You May Also Find These Documents Helpful

  • Good Essays

    The User Domain will enforce an acceptable use policy (AUP) to define what each user can and cannot do with any company data shall he or she have access to it. As well as with company users, any outside contractor or third-party representatives shall also need to agree and comply with the AUP. All users must be properly identified and sign this AUP prior to gaining any access whatsoever to the company network. No exceptions. Any violation will be taken up with company executives and/or the authorities to assess further punitive action.…

    • 471 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Policy, To tell all employees about it and to revise it as often as necessary. This…

    • 2183 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    It is the responsibility of Remote Users to make sure that reasonable measures have been taken to secure the Remote Host used to access Richman IT Resources. This standard applies to all Remote Users of Richman IT Resources including staff, outside contractors, vendors, and other agents. Remote Access Security Standards All Remote Users must follow the security requirements set forth in this standard for any Remote Host accessing IT Resources prior to such access, as well as any guidelines, procedures, or other requirements issued by their departmental IT units and the owners of the IT Resource which are to be remotely accessed. Remote User responsibilities are described below: Remote User Requirements: Remote Users must make sure that their Remote Hosts used to access Richman IT Resources meet all security expectations specified in the End User Guidelines Security prior to accessing any Richman IT…

    • 438 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 9 Assignment 1

    • 582 Words
    • 2 Pages

    - Ensure compliance requirements of this policy concerning data at rest and role-holders access to managed networks, systems and servers…

    • 582 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    unit 4 assignment 2

    • 303 Words
    • 2 Pages

    After research and careful consideration of some of the other policies listed by other companies such as AT&T, Sprint, T-Mobile, and Verizon Wireless, Richman Investments has come up with the an acceptable use policy (AUP).…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The scope of this policy includes all users who have access to company-owned or company-provided computers or require access to the corporate network and/or systems. This policy applies not only to employees, but also to guests, contractors, and anyone requiring access to the corporate network. Public accesses to the company’s externally-reachable systems, such as its corporate website or public web applications, are specifically excluded from this policy.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP). Informing the users will be of what is acceptable and unacceptable use of the system. This layer also needs constant monitoring.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Ip Networking

    • 327 Words
    • 2 Pages

    The User Domain defines the people who have permissions to a company’s information system. This domain contains all of the user information and will enforce an Acceptable Use Policy (AUP) that will define what each user has permissions to do with any company data that they may have access to. This domain is not the strongest link in any company’s infrastructure.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Ticket Escalation

    • 306 Words
    • 2 Pages

    We can better manage these business requirements by each department receiving a copy of the policy once it is finalized. Each employee of this company should get a copy and be aware of this new policy to avoid any confusion or complaints in the future.…

    • 306 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Assignment 4 Nt2580

    • 485 Words
    • 2 Pages

    2. General access to the Internet for recreational use by immediate household members through the Richman Investments Network on personal computers is permitted for employees that have flat-rate services. The Richman Investments employee is responsible to ensure the affiliated member does not violate any Richman Investments policies, does not perform illegal activities, and does not use the access for outside business interests. The Richman Investments employee bears responsibility for the…

    • 485 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Richman Investments at all times is to establish acceptable and unacceptable use of electronic devices and network resources. All employees of Richman Investments must comply with the rules and regulations for use of the Internet, sending e-mail, going to social media sites, and downloading attachments. The Richman Investments AUP will help achieve these goals.…

    • 441 Words
    • 2 Pages
    Good Essays
  • Good Essays

    After the policy is in place, each organization and health care facility must do their own evaluations of all employees and make sure the agreement of the law remains in place.…

    • 744 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ops Presentation

    • 3799 Words
    • 16 Pages

    This report offers advice on how to successfully incorporate this new venture into the existing processes within the company as…

    • 3799 Words
    • 16 Pages
    Powerful Essays