Preview

Acceptable Use Policy

Good Essays
Open Document
Open Document
622 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Acceptable Use Policy
To Whom It May Concern:

Thanks for all of your hard work and dedication to the company. We at MGI appreciate the level of gratitude that all of you put forth to make this company a driving force. Our major concern is that all employees in our company understand and comply with company policy. This Acceptable Use Policy (AUP) sets forth the Company’s policy with regard to the use of Autosource Group, Inc. (AGI) Computer and Network Resources. You, the user, are ultimately responsible for your actions in accessing and using Network Resources. As a user of AGI Network Resources, you are expected to review and understand the guidelines and procedures in this document.

SCOPE

This policy applies to all AGI hourly associates who will have
…show more content…
While use of AGI Network Resource is solely for Company business, some incidental personal use may be permissible, particularly during the employee’s personal time. Personal access to the Internet within reasonable limits is also allowed. Employees do not have a reasonable expectation of privacy with respect to their use of the Company’s Network Resources, and the Company reserves the right to monitor the employees’ use of Network Resources, including accessing files/communications, as deemed appropriate by the Company and in compliance with all applicable laws (HMS Host handbook, …show more content…
AGI computers must not be used with intentions of misuse and/or abuse of any AGI assets.

* Illegal or Indecent Use: Using AGI network Resources for illegal, harassing, vandalizing, indecent, or inappropriate purposes (including accessing, sorting, or viewing pornographic, indecent, or otherwise inappropriate material), or in support of such activities is prohibited. Inappropriate use includes any violations of generally accepted social standards for use of publicly-owned and operated equipment (HMS Host handbook, n.d).

Any violation of this AUP may result in the suspension or termination of your access to the resources and/or disciplinary actions. Each employee is required to adhere to the AGI Company Code of Ethical Conduct which is accessible on the Human Resources Intranet/Portal site, on the Compliance menu. We do appreciate your time and effort to keep this company first. If you need to talk with me personally, you can contact me at 404-567-9110 Colette Andrews, Vice

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2640 Lab 7 SC

    • 2232 Words
    • 17 Pages

    The company’s home office in Gadsden (GAD) provides services to branch offices such as the Birmingham (BHM) office. These offices have some minor security and performance concerns. You will implement standard ACLs as a simple and effective tool to control traffic based…

    • 2232 Words
    • 17 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    2. General access to the Internet for recreational use by immediate household members through the Richman investments Network on personal computers is permitted for employees that have flat-rate services. The Richman investments employee is responsible to ensure the family member does not violate any Richman investments policies, does not perform illegal activities, and does not use the access for outside business interests. The Richman investments employee bears responsibility for the consequences should the access is misused.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    I. Track and monitor abnormal employee behavior, erratic job performance, and use of IT infrastructure during off-hours. Begin IT access control lockout procedures based on AUP monitoring and compliance.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 3 assignment 1

    • 479 Words
    • 2 Pages

    This policy applies to all Richman Investments employees, contractors, vendors and agents with a Richman Investments owned or personally-owned computer or workstation used to connect to the Richman Investments network. This policy applies to remote access connections used to do work on behalf of Richman Investments including reading or sending email and viewing intranet web resources and wireless devices.…

    • 479 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    File sharing P2P, access web sites that are prohibited, purposely do things not supposed to according to the AUP, and spam coworkers.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware, which spread to the network server. The security officer at Richman has asked you to research and to define “the acceptable use of Richman assets regarding Internet and e-mail access,” including the actions that are prohibited. The employees must be restricted from using the Internet at work for personal use, other than to occasionally check Web-based personal e-mail accounts. Personal downloads must be strictly prohibited. Your definition will become part of the overall Richman security policy.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Many members of the Regional ABC Credit union/bank Systems Division support staff have some level of special access. Special access is defined as having the password and privilege to use a special account (e.g., root) on a Regional ABC Credit union/bank System Division computer or subsystem or to have privileges above and beyond those of normal users. The first time a member of the Regional ABC Credit union/bank support staff requests special access, he/she is asked to read and sign the Special Access Guidelines Agreement. This agreement presents general guidelines for using special access in a responsible and ethical manner. The…

    • 1260 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    why you should listen

    • 496 Words
    • 2 Pages

    media does not constitute an official endorsement or approval of the use of such commercial hardware or…

    • 496 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    As with all network resources there is always the possibility of the system being hacked or misuse of the data by trusted employees. In this case, the company must give privileges to trust worthy employees to have access which can be vital to the company reputation. System monitoring is recommended to spot unusual network traffic and server requests. Along with user permissions, strong passwords and Mac address filters will help to mitigate these issues that might arise if the security of this system compromised.…

    • 951 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Consent to search and monitoring of computers, media, and communications used by the employee in the performance of his or her duties for the company.…

    • 974 Words
    • 4 Pages
    Good Essays
  • Good Essays

    This User Agreement governs all of your use of our internet-delivered work collaboration service (the “Online Service”),…

    • 4335 Words
    • 18 Pages
    Good Essays
  • Powerful Essays

    HRM3704

    • 5092 Words
    • 17 Pages

    [To be issued by employer to staff governing authorised use of internet and email facilities assuming that limited personal use is permitted]…

    • 5092 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    This policy is intended to meet the control requirements outlined in SEC502, and SEC501, Section 8.3 Audit and Accountability Family, Controls AU-1 through AU-11. All VITA employees (classified, hourly, or business partners) as well as all VITA systems classified as sensitive”. (www.vita.virginia.gov).…

    • 760 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Thesis

    • 10911 Words
    • 44 Pages

    Also the system allows the Human Resources Department to add, view and update the employee’s information through internet. The Manager will have access to view his employee(s) information.…

    • 10911 Words
    • 44 Pages
    Powerful Essays
  • Powerful Essays

    Young, K. (2010). Policies and procedures to manage employee Internet abuse. Computer in Human Behavior 26 (2010).…

    • 1401 Words
    • 5 Pages
    Powerful Essays

Related Topics