Preview

Unit 4 Assignment 2

Satisfactory Essays
Open Document
Open Document
1005 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 4 Assignment 2
NT2580: Introduction to Information Security
Unit 4 Assignment 2
4/12/2014
Acceptable Use Policy (AUP) Definition
Richman Investments Acceptable Use Policy
The use of company-owned computing devices and networks is a privilege, instead of a right, and inappropriate use can result in revocation of such privilege. Employees must remember that their behaviors represent the actions of the company, and the respect to the rights of others and all relevant laws, regulations and contracts. Employees also must be aware of that their inappropriate uses may lead to catastrophic results on the company and other employees. This acceptable use policy grants the right for users to gain access to the network of Richman Investments and also binds the said user to follow and abide accordingly to the agreements set forth for network access provided below.
Acceptable Uses:
General and authorized uses for achieving the objectives of their job description, and occasional personal communications by using email.
Unacceptable Uses:
For Internet Use, the following actions are prohibited:
Accessing, downloading, storing, recording sites that are offensive, obscene, defamatory, abusive or otherwise unlawful
Knowingly downloading any materials irrelevant to their work
Conducting actions irrelevant to their work, such as playing games, listening to music, watch videos, and etc.
Internet usage should be conducted for the company business only.
Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information.
The use of personal internet must be limited and only to be used for web based emails only with the approval of your Supervisor or Manager.
For Email Use, the following actions are prohibited:
Accessing inappropriate sites or inappropriate e-mail
Transmitting private mass mailings
Transmitting messages disclosing personal information without

You May Also Find These Documents Helpful

  • Good Essays

    Unit 2 Assignment 2

    • 676 Words
    • 3 Pages

    1. Microsoft is aware that research was published at a security conference proving a successful attack against X.509 digital certificates signed using the MD5 hashing algorithm. This attack method could allow an attacker to generate additional digital certificates with different content that have the same digital signature as an original certificate. The MD5 algorithm had previously shown a vulnerability, but a practical attack had not yet been demonstrated.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4 Assignment 4

    • 122 Words
    • 1 Page

    A private network schema is a viable choice for internal IP addressing. Each office can have its own range to avoid conflicts with other locations if subnetted correctly. Assuming that all nodes and servers have only one interface, you should only need one public address per outward interface. In the diagram provided, you would only need one public IP address for the router connection to the Internet. Everything else can be addressed privately with the correct subnetting.…

    • 122 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 349 Words
    • 1 Page

    IP route: One entry in an IP routing table that lists some potential destination (usually a network ID or subnet ID) as forwarding instructions, including the interface out which the router should forward the IP packet.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    A lot of networks have an email service, which allows people to communicate with each other. For a company, this is an advantage because employees can share sensitive information privately within the network.…

    • 1327 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    unit 3 assignment 4

    • 4187 Words
    • 14 Pages

    It is not only individuals in the consumer marketplace that have the potential to buy, as buyers also exist in the business to business market. B2B markets are individuals that have the responsibility of purchasing on behalf of the business. Cadbury have both individual and business to business consumers. They trade with all major supermarkets and superstores, but also sell to local and private shops. This way they can broaden their distribution and reach customers and consumers everywhere.…

    • 4187 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Internet use at Richman is only authorized to conduct Company business only. Internet use can easily allow hackers to see confidential Company information and allow viruses. This allows the hackers to get passwords and other important things. Which is why we want the staff at Richman’s to only use the internet for business only and business only sites. Employees can only check their business…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 457 Words
    • 2 Pages

    Global Limited has the reputation as one of the world’s leading providers of infrastructure information systems, software, and services around the world. Global’s clients range from world-wide enterprises to startup companies across all industry sectors, including financial services, manufacturing, transportation, and public services.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    When accessing the company’s network (on-site or remotely), employees must limit personal computer and internet usage only during their allocated break and lunch times. During these times, internet and computer usage must be appropriate. In the case there is reasonable suspicion that an employee is in violation of this policy, the company holds the right to monitor computer activity. The company holds the right to terminate an employee based on information found after monitoring their workstation. If the offense does not deem a termination, computer training will be conducted for the employee to reestablish comprehension of proper use of company resources.…

    • 945 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Acceptable Use Policy

    • 622 Words
    • 3 Pages

    Thanks for all of your hard work and dedication to the company. We at MGI appreciate the level of gratitude that all of you put forth to make this company a driving force. Our major concern is that all employees in our company understand and comply with company policy. This Acceptable Use Policy (AUP) sets forth the Company’s policy with regard to the use of Autosource Group, Inc. (AGI) Computer and Network Resources. You, the user, are ultimately responsible for your actions in accessing and using Network Resources. As a user of AGI Network Resources, you are expected to review and understand the guidelines and procedures in this document.…

    • 622 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The LAN to WAN acceptable use Policy will go hand in hand with the roles and tasks parts of the user domain. Users would be given access to certain systems, applications, and data depending on their access rights. The AUP is like a rulebook that employees need to follow when using an organization’s IT assets and if they are violated it could be grounds for termination. The AUP will set grounds on employees to understand that they are responsible for any and all actions on an organization’s IT assets. In particular to organizations…

    • 411 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Any time a company allows employees access to their email system, the organization 's assets, future and reputation are at risk (techtarget.com, 2004). As a result it is important that a company email policy be created and implemented. This policy will include: the purpose of emails, the ownership of emails, email usage, sensitive and confidential materials, prohibited content in emails, virus checking archiving emails and violations to the email policy. The implementation of this policy will minimize the legal risk to both the company and individuals involved.…

    • 1148 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Cis Computer Case Study

    • 1800 Words
    • 8 Pages

    First, the employees are always available and easy to reach. In fact, sometimes it is essential that the employee checks the important information in a particular moment that is why, easy access to the work e-mail is convenient. Second, the employees are able to access important information by using their portable devices (iPhones, BlackBerries etc). It is important to mention that those applications provide the same high level of security for authenticating users. Third, business applications allow big…

    • 1800 Words
    • 8 Pages
    Good Essays
  • Good Essays

    IKEA

    • 262 Words
    • 2 Pages

    d. Employees shall only access e-mail accounts through systems set up by the County, including…

    • 262 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Acceptable Use

    • 1456 Words
    • 9 Pages

    The University Information Technology Network includes: Internet/Intranet/Extranetrelated systems, including but not limited to computer/Networking equipment, Software,…

    • 1456 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    In today’s society it is a guarantee that no matter where or who you work for, you will be using a computer and doing tons of electronic correspondence through e-mail. Few people know that e-mail has been around for almost a hundred years. “If 'e-mail ' is loosely defined as 'messages transmitted electronically ', then the first 'e-mail messages ' would have started in the last century with telegraph messages (by wire) and Morse Code transmissions (via airways)” (University of Maryland, 2002). E-mail as we are familiar with today, has come a long way from its origins in the late 1970’s. The patented “You got mail” was the catchphrase of the 90’s and became a staple in our lives. Little did we as a society know exactly how important that little phrase would become in both our personal and professional lives. E-mail is so widely used in todays workforce that individuals often take it for granted and misuse e-mail. In this presentation there will be discussion about proper e-mail etiquette in work correspondence, privacy issues regarding e-mail at work and an employers responsibilities regarding his or hers employees e-mail.…

    • 1575 Words
    • 7 Pages
    Powerful Essays

Related Topics