Preview

The Acceptable Use Policy In Sporting Goods

Powerful Essays
Open Document
Open Document
2122 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Acceptable Use Policy In Sporting Goods
Abstract
An information technology Acceptable Use Policy (AUP) creates an understanding of what is acceptable and not acceptable between users of a system and the system owner. The AUP provides the details of criteria to establish the same rules for everyone. The AUP also serves as documentation, which the user signs, to justify that the user know the rules that they are to follow and the consequences in not following the rules.
This paper attempts to draft a policy for a fictional online retail company named Sporting Goods. The paper will conclude with explaining why areas where chosen in the policy draft along with the ethical and legal effects of the policy draft.

Sporting Needs is a retail business organization that provides sporting apparel
…show more content…

Sporting Needs provides policies, known as Acceptable Use Policies (AUPs), outlining the requirements in the use of Sporting Needs information technology asset. The following are the Acceptable Use Policies are the policies representing an agreement between Sporting Needs and its employees in the use of Sporting Needs information technology assets.

Acceptable Use Policy
1. Overview
This policy’s purpose is to provide what is tolerable and intolerable pertaining to the use of electronic devices and network resources with the established culture of trust, integrity, ethical and lawful behavior, and openness expected of the Sporting Needs organization. (Reid, Hilldale, 2006)
Information technology systems, including but not limited to computer equipment, networks, email, social media, and internet use, needed to meet missions, goals, and initiatives are the responsibility of Sporting Needs. The responsibility of Sporting Needs are in the managing, use, and security of its information assets. This policy requires the users of Sporting Needs information technology assets to adhere with company policies to protect the Sporting Needs organization and the users of Sporting Needs information technology assets.

2.
…show more content…

This policy applies to computer equipment and information technology resources used in conducting business owned or leased by Sporting Needs or connected to a Sporting Needs network or system residing at a Sporting Needs site or through the internet. Exceptions to this policy must have advance approval from the Sporting Needs information security teams. (SANS Institute, 2014)

4. Policy
4.1. General Use
4.1.1. As a user of Sporting Needs computer equipment and information technology resources, you are responsible for exercising good judgment in its use in accordance with Sporting Needs standards, guidelines, and policies.
4.1.2. Users are not to use Sporting Needs computer equipment and information technology resources for any illegal or unauthorized purpose. Examples include but not limited to:
4.1.2.1. Distributing and downloading pirated data or software.
4.1.2.2. Transmitting worms, Trojan horses, trap door code, or


You May Also Find These Documents Helpful

  • Good Essays

    References: Cheeseman, Henry R. (2010). The Legal Environment of Business and Online Commerce: Business Ethics, E-Commerce, Regulatory, and International Issues, Sixth Edition. Published by Prentice Hall.…

    • 896 Words
    • 4 Pages
    Good Essays
  • Better Essays

    These system security policies, standards, and procedures that have been established for the Corporation Tech System, are intended to comply with the regulations and policies set down by the State of Florida, Corporation Tech, and the Federal Information Security Management Act (FISMA).…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Good Essays

    Unit 9 Assignment 1

    • 582 Words
    • 2 Pages

    - Ensure compliance requirements of this policy concerning data at rest and role-holders access to managed networks, systems and servers…

    • 582 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The User Domain will enforce an acceptable use policy (AUP) to define what each user can and cannot do with any company data shall he or she have access to it. As well as with company users, any outside contractor or third-party representatives shall also need to agree and comply with the AUP. All users must be properly identified and sign this AUP prior to gaining any access whatsoever to the company network. No exceptions. Any violation will be taken up with company executives and/or the authorities to assess further punitive action.…

    • 471 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Cons putting a limitation to web surfing may cause the employee to lack independence of finding information. What if they need to look up an answer to a customers’ question and has to find it on the web?…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 4 assignment 2

    • 303 Words
    • 2 Pages

    After research and careful consideration of some of the other policies listed by other companies such as AT&T, Sprint, T-Mobile, and Verizon Wireless, Richman Investments has come up with the an acceptable use policy (AUP).…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    I am a network intern at Richman Investments. My supervisor has asked me to make an Acceptable Use Policy for our company because one of our employees infected our server with a virus. So in order to keep the organization safe I have come up with a Acceptable Use Policy for Richman Investments.…

    • 441 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt2580 Unit 4 Aup

    • 432 Words
    • 2 Pages

    The acceptable use policy is a set of rules that a corporation, organization or internet service providers, provide to their employees about the use of computers, networks and associated resources. These rules would state that not only just employees but users as well should not access the system areas where they are not authorized to, they would be held accountable for what all they do, they should only use to computer that was issued to them for purposes assigned to them, etc. These rules basically state that the computers are not to be used improperly or illegally during or after work hours at job sites. Verizon wireless “acceptable use policy” states that there should be no illegal use of their personal internet meaning that their services should only be used for lawful purposes only. This includes any unauthorized actions to illegal sites or violation of control laws. Their email use is prohibited for users to use illegally. NO commercial advertising or informational announcements are allowed. AT&T “acceptable use policy” prohibits any use of their services in any way illegally, unlawful, or harmful in any way to their company or any other company. Their AUP also doesn’t want any unauthorized access to pornography sites, inappropriate interaction with minors or threatening of material or contents. AT&T email services are not to be used for inappropriate emails or messages. Cox Communication email prohibits sending any unsolicited mail messages. Commercial advertising and informational email is spamming and prohibited as well. Their services are not to be used illegally for any purposes by users or employees. All three of these companies basically have the same laws/rules which from reading up on other companies are all the same but just worded differently.…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    Identify at least two types of security events and baseline anomalies that might indicate suspicious activity.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware, which spread to the network server. The security officer at Richman has asked you to research and to define “the acceptable use of Richman assets regarding Internet and e-mail access,” including the actions that are prohibited. The employees must be restricted from using the Internet at work for personal use, other than to occasionally check Web-based personal e-mail accounts. Personal downloads must be strictly prohibited. Your definition will become part of the overall Richman security policy.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The purpose of this policy is to describe what steps must be taken to ensure that users connecting to the corporate network are authenticated in an appropriate manner, in compliance with company standards, and are given the least amount of access required to perform their job function. This policy specifies what constitutes appropriate use of network accounts and authentication standards.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Acceptable Use Policy

    • 1915 Words
    • 8 Pages

    Purpose. The purpose of this Acceptable Use Policy is to provide guidelines which will be applied in determining acceptable use of this Web site, and to notify you of the terms of this service. As a user of this service, you agree to comply with this policy, the stated acceptable uses and the terms of service.…

    • 1915 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    Conducting actions irrelevant to their work, such as playing games, listening to music, watch videos, and etc.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays