Preview

An Internet Usage Policy Provides Employees with Rules and Guidelines About the Appropriate Use of Company Equipment

Better Essays
Open Document
Open Document
2525 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
An Internet Usage Policy Provides Employees with Rules and Guidelines About the Appropriate Use of Company Equipment
An Internet usage policy provides employees with rules and guidelines about the appropriate use of company equipment, network and Internet access. Having such a policy in place helps to protect both the business and the employee; the employee will be aware that browsing certain sites or downloading files is prohibited and that the policy must be adhered to or there could be serious repercussions, thus leading to fewer security risks for the business as a result of employee negligence. The Internet Usage Policy is an important document that must be signed by all employees upon starting work. Below is a Sample Internet Usage Policy that covers the main points of contention dealing with Internet and computer usage. The policy can then be tailored to the requirements of the specific organization.
Internet usage policy
This Sample Internet Usage Policy applies to all employees of company who have access to computers and the Internet to be used in the performance of their work. Use of the Internet by employees of company is permitted and encouraged where such use supports the goals and objectives of the business. However, access to the Internet through company is a privilege and all employees must adhere to the policies concerning Computer, Email and Internet usage. Violation of these policies could result in disciplinary and/or legal action leading up to and including termination of employment. Employees may also be held personally liable for damages caused by any violations of this policy. All employees are required to acknowledge receipt and confirm that they have understood and agree to abide by the rules hereunder.
Computer, email and internet usage * Company employees are expected to use the Internet responsibly and productively. Internet access is limited to job-related activities only and personal use is not permitted * Job-related activities include research and educational tasks that may be found via the Internet that would help in an employee 's



References: Butler. (2000). Internet Usage Monitoring and Reporting. Butler.org. http://www.butler.org/bhis/policy/internet.html. Updated August 9, 2000. Accessed November 19, 2000. Gaudin, S. (1999). The Perils of Privacy. Network World. http://www.nwfusion.com/power99/power99-privacy.html. Updated December 27, 1999 Murphy, C. (2000). More Companies Keep Eye on Employee 's Messages. Overly, M. (1999). E-policy: How to develop computer, e-mail, and Internet guidelines to protect your company and its assets Yasin, R. (1999). Web Slackers Put On Notice. InternetWeek. http://www.internetwk.com/lead/lead101599.htm. Updated October 15, 1999. Accessed November 21, 2000.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    • Compile and submit all previous weeks’ sections with this week’s Network Security Policy and Executive Summary sections as a final Information Security Policy (Appendix B).…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Select one of the company profiles below to be used for your Information Security Policy…

    • 396 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Employees will be also using the workstation domain is where they will connect to the company’s network. Tight security and access controls will be enforced on company equipment and users must have proper access rights…

    • 539 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    2. General access to the Internet for recreational use by immediate household members through the Richman investments Network on personal computers is permitted for employees that have flat-rate services. The Richman investments employee is responsible to ensure the family member does not violate any Richman investments policies, does not perform illegal activities, and does not use the access for outside business interests. The Richman investments employee bears responsibility for the consequences should the access is misused.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    The User Domain will enforce an acceptable use policy (AUP) to define what each user can and cannot do with any company data shall he or she have access to it. As well as with company users, any outside contractor or third-party representatives shall also need to agree and comply with the AUP. All users must be properly identified and sign this AUP prior to gaining any access whatsoever to the company network. No exceptions. Any violation will be taken up with company executives and/or the authorities to assess further punitive action.…

    • 471 Words
    • 2 Pages
    Good Essays
  • Good Essays

    General access to the Internet by household members via the Richman Investments network will be permitted, and should be used responsibly, such that all Richman Investments standards and guidelines are enforced for the duration of Internet activity. The Richman Investments agent, vendor, contractor, or employee will bear any responsibilities and consequences for any misused access.…

    • 399 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 4222-307 Answers

    • 767 Words
    • 4 Pages

    The Internet and Email Acceptable Use Policy provides all staff with access to email and internet a framework and set of rules and regulations to follow, to ensure that they know what they can and cannot enter or send…

    • 767 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Nt2580 Final Project

    • 1848 Words
    • 6 Pages

    System Administration, Networking, and Security Institute or SANS.org (2001) “View Employee Internet Use Report (PDF)” retrieved from http://www.sans.org/security-resources/policies/internet.php…

    • 1848 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Unit 2 Lan

    • 272 Words
    • 2 Pages

    Define a LAN-to-WAN, Internet, and Web surfing AUP that restricts usage of the company’s Internet connection and permits the company to monitor usage of the corporate Internet connection. Carefully evaluate the implications of each policy and how implementations might impact the IT infrastructure, both positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to the legitimate users and how it might bring security at the expense of preventing a perfectly legitimate…

    • 272 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Note. The Week Two assignment has been identified as a tool to assist in the university’s Programmatic Assessment Project. As such, completed student assignments may be periodically sampled for program analysis purposes. To assist in maintaining the integrity of the data collected, do not change the content of this assignment. Please delete this note before submitting to students.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    NT2580

    • 940 Words
    • 4 Pages

    * Do not create unnecessary business risk to the company by misuse of the network, internet, or email services…

    • 940 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Richman Investments agents, vendors, contractors, and employees with privilege to remote access to Richman Investments’ corporate network are responsible for ensuring that they adhere to these standards, whether using company-owned or personal equipment for data access, and that they follow the same guidelines that would be followed for on-site connections to the Richman Investments network. General access to the Internet by household members via the Richman Investments network will not be permitted, and should be used responsibly, such that all Richman Investments standards and guidelines are enforced for the duration of Internet activity. The Richman Investments agent, vendor, contractor, or employee will bear any responsibilities and consequences for any misused access.…

    • 1109 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Compare the portions that address Internet and e-mail access of at least three different companies.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays

Related Topics