Preview

Define An Exceptable Use Policy

Satisfactory Essays
Open Document
Open Document
430 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Define An Exceptable Use Policy
Define an Acceptable Use Policy
Purpose
The purpose of this document is to outline the requirements of the acceptable use policy of Richman
Investments. An Acceptable Use Policy (AUP) or fair use policy, is a set of rules applied by the owner or manager of a network, website, service, or large computer system that restrict the ways in which the network, website or system may be used. AUP documents are written to reduce the potential for legal action that may be taken by a user. Richman Investments requires the enforcement of strict ingressegress filtering policies for network traffic. In this document we will describe the importance of having security policies in place to help identify inappropriate activity on a network and develop a basic ANP that explains the handling of such incidents.
Requirements
For users to remotely access data safely on company networks and computers it it important to have an acceptable use policy in place.
• Methods that can be used to connect remotely, such as dial up or virtual private network (VPN)
• Requirements for user systems before they are allowed to connect.
• Terms of use associated with remotely connecting to the network.
• Policy enforcement
Compliance
Users in violation of the acceptable use policy will be subject to six levels of consequences including the issuing of warnings, written or verbal. Suspending the Member's newsgroup posting privileges.
Suspending or terminating the member's account. Billing the member for administrative costs and/or reactivation charges, or bringing legal action to collect damages, if any, caused by violations. Users have a responsibility to report theft, loss, and/or disclosure of Richman Investments secure or personal data and are subject to consequences as described above. All internet and Intranet related equipment,
Definitions
Terms
• Acceptable Use Policy (UAP)
• End User License Agreement (EULA)
Terms of Use
Use of the Richman Investment Acceptable data

You May Also Find These Documents Helpful

  • Satisfactory Essays

    440iLabWeek7Complete

    • 152 Words
    • 2 Pages

    In this Lab I built a network that consists of various departments within an organization that utilize the internet to access the company servers. Upper management suspects that various departments within the organization are abusing the network resources by downloading music movie trailers in strict violation of company policy. I have monitored the network and the abuse of the network resources. I have taken corrective measures to track the abuse back to the appropriate department involved.…

    • 152 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    The plan to secure the workstation domain enforces a strong password policy on each workstation and also enables screen lockout protection for inactive times. Keeping all workstations with an up to date antivirus is essential. Furthermore, content filtering features will arrange access of specific domain names according to AUP definitions. In addition, workstations will have up-to-date application software and security patches conferring to company guide lines. As part of the workstation security strategy IT will disable the auto-play feature and will enable automatic scan for any external devices that may be connected to the machine. This measure will ensure the content is secure.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Scope this policy applies to all Richman Investments employees, contractors, vendors and agents with a Richman Investments-owned or personally-owned computer or workstation used to connect to the Richman Investments network. This policy applies to remote access connections used to do work on behalf of Richman Investments, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to: frame relay, DSL, ISDN, SSH, VPN, dial-in modems, and cable modems, etc.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    ____ supports advanced authentication and encryption technologies; however, it requires Windows machines on both sides of any remote connection.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    IT205 Week 4 Assignment

    • 641 Words
    • 2 Pages

    The way the system is installed where I work is Internet is set with a LAN to WAN. I have a space where I utilize email trade, server controls enact registry. Now with the LAN server with a activate directory set permission control for user and the system administrator is responsible for the performance and operation. Are Administrator sign me to a computer this is one form of security here. Another way to prevent people from coming to the server or network, For example if we have important information it will go through a router then you will have a firewall this will prevent people from interring are network. Also every employee in the company as a CAT card, A CAT card as a pin number associate with every employee. This pin number allow you access the computer and also getting in the building but the mean point with the CAT card allow you to access computer and emails. By this will let the company know whom using the computer and access the web and emails. It prevents dishonesty with the company. Now getting that out the way I will explain what I do for work.…

    • 641 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The user domain contains the employees that will be accessing resources in the network. Users access systems, applications, and data within the rights and privileges defined by the acceptable use policy. The AUP must be followed at all time or the user may be terminated. There are threats ranging from lack of awareness to blackmail and extortion. All employees are responsible for their own actions when using the network. The users will all be expected to read and abide by the acceptable use policy. (Kim & Solomon, 2012)…

    • 539 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    This policy applies to all Richman investments employees, contractors, vendors and agents with a Richman investments-owned or personally-owned computer or workstation used to connect to the Richman investments network. This policy applies to remote access connections used to do work on behalf of Richman investments, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    IS 3350: Policy Report

    • 1146 Words
    • 5 Pages

    The purpose of this policy is to understand what needs to be done with documents that contain…

    • 1146 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The purpose of this policy is to define standards for connecting to Corona District High School's network from any host. These standards are designed to minimize the potential exposure to Corona District High School from damages which may result from unauthorized use of Corona District High School resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Corona District High School internal systems, etc.…

    • 848 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    1. A user made unauthorized use of network resources by attacking network entities. You are potentially sabotaged by an employee or employer.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Victoria Chemicals

    • 864 Words
    • 4 Pages

    The treatment of conflicts of interest and other ethical dilemmas that may arise in investment decisions.…

    • 864 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Internet use at Richman is only authorized to conduct Company business only. Internet use can easily allow hackers to see confidential Company information and allow viruses. This allows the hackers to get passwords and other important things. Which is why we want the staff at Richman’s to only use the internet for business only and business only sites. Employees can only check their business…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ➢ Offenses after that should result in a ban from the server at a time deemed…

    • 538 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Acceptable Use Policy

    • 521 Words
    • 3 Pages

    All of the AUPs model a rough outline given by the US government. All respect the privacy of other students, respect the academic integrity of electronic resources,…

    • 521 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Investment Law Au

    • 3162 Words
    • 13 Pages

    Bibliography: John McLaren, M. N. (2011). Law of Investments. Sydney: Thomson Reuters (Professional) Australia Limited .…

    • 3162 Words
    • 13 Pages
    Powerful Essays