Top-Rated Free Essay
Preview

Acceptable Use Policy (Aup) Definition

Good Essays
441 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Acceptable Use Policy (Aup) Definition
Assignment 1: Acceptable Use Policy (AUP) Definition I am a network intern at Richman Investments. My supervisor has asked me to make an Acceptable Use Policy for our company because one of our employees infected our server with a virus. So in order to keep the organization safe I have come up with a Acceptable Use Policy for Richman Investments.
1.0 Introduction Richman Investments at all times is to establish acceptable and unacceptable use of electronic devices and network resources. All employees of Richman Investments must comply with the rules and regulations for use of the Internet, sending e-mail, going to social media sites, and downloading attachments. The Richman Investments AUP will help achieve these goals.
2.0 Scope Every supervisor, employee and temporary employee that works for Richman Investments must follow this policy as it is written. This policy also applies to all equipment affiliated with Richman Investments.
3.0 Policy 3.1 General 1. As an employee of Richman Investments, you are responsible for using good judgment regarding the use of internet access. In ordnance with the policies set forth by Richman Investments resources may not be used for any unlawful or prohibited purpose. For extra security Richman Investments will monitor all systems, equipment, and network using the Audit Policy. Any devices that might interfere with the Richman Investments network will be immediately disconnected. Firewalls must be turn on at all times.
3.2 Security 1. Every device connected to the Richman Investments network must comply with the Access Control Policy 2. All employees of Richman Investments must keep their passwords secure. 3. Every laptop, PDA, desktop or workstations must be secured with a password protected screensaver and with a activation lock of 15 minutes or less. All employees must log off when they are finished using the device. 4. Always use encryption in compliance with Richman Investments Acceptable Encryption Use Policy. 5. All Richman Investments employees should use caution with opening up an e-mail attachment. Do not open up an e-mail attachment from a unnamed source. These attachments might contain spam, viruses or even Trojan Horses. 3.3 Unacceptable Use 1. Sending spam using e-mail, text messages, or instant messages 2. Giving your password out to other employees, or letting other employees use your account. 3 Unauthorized copying of copyrighted material that includes books, music, photographs or magazines. 4. Causing a security breach to Richman Investments or other network resources, but not limited to, accessing data, servers, or accounts you don’t have access to which you are not authorized.
4.0 Enforcement Any employee who violates this policy will be immediately terminated

You May Also Find These Documents Helpful

  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Create a simple Internet OR e-mail use policy for Richman Investments that defines the acceptable and unacceptable use of Internet and e-mail access at Richman. Go to the SANS website at http://www.sans.org/security-resources/policies/ to view sample policies.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Security is embraced by the executive management staff at MJD Electronics. An important task for the Chief Security and Compliance Officer for MJD Electronics is to outline a plan that makes considerations for many of the important aspects of valid security architecture. This discussion presents more detailed information on many topics that should be included in a solid security architecture including border routers, demilitarized zones, proxy firewalls, access control lists and filters, fail-safe equipment, and more.…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the WAN domain, we need to have firewalls set up to filter all incoming traffic. A firewall will stop all traffic not wanted on the Richman Investments network.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT1330 Unit 3 Assignment 3

    • 1030 Words
    • 5 Pages

    Firewall these devices are designed to keep threats out of the company network, but unfortunately, the devices are configured by humans which can have error or security risks put in place to take over the network.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    2. General access to the Internet for recreational use by immediate household members through the Richman investments Network on personal computers is permitted for employees that have flat-rate services. The Richman investments employee is responsible to ensure the family member does not violate any Richman investments policies, does not perform illegal activities, and does not use the access for outside business interests. The Richman investments employee bears responsibility for the consequences should the access is misused.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    -Subpart B. Unauthorized use. Users must abide by the security restrictions on all systems and information to which access is authorized.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Project for IS3350

    • 588 Words
    • 3 Pages

    You will gain an understanding of the aspects involved in the conception, enforcement, and implementation of security policies. You will also gain insight to risk analysis and will learn how to respond to any given situation that might arise from a violation of those security policies.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    unit 4 assignment 2

    • 303 Words
    • 2 Pages

    After research and careful consideration of some of the other policies listed by other companies such as AT&T, Sprint, T-Mobile, and Verizon Wireless, Richman Investments has come up with the an acceptable use policy (AUP).…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It 255

    • 629 Words
    • 3 Pages

    3. Incidental personal use of electronic mail, Internet access, fax machines, printers, and copiers is restricted to Richman Investments approved users…

    • 629 Words
    • 3 Pages
    Good Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    Identify at least two types of security events and baseline anomalies that might indicate suspicious activity.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Aup Definition

    • 326 Words
    • 2 Pages

    Richman Investments holds requirements for the usage of the company network including filtering polocies for network traffic.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays