Preview

Unit 4 Assignment 2: Acceptable Use Policy (AUP) Definition

Good Essays
Open Document
Open Document
696 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 4 Assignment 2: Acceptable Use Policy (AUP) Definition
E-mail
All messages composed, sent, received, or stored on the e-mail system are and remain the property of the company. They are not the private property of the employee. Personal e-mail accounts are not to be used on the company’s computer system.
The e-mail system is not to be used to send offensive, sexually suggestive, obscene, lewd, demeaning, or disruptive messages. This includes, but is not limited to, messages that are inconsistent with the company’s policies on equal employment opportunity, anti-discrimination, and anti-harassment (including sexual harassment). Moreover, the e-mail system is not to be used to solicit or proselytize for commercial ventures, religious or political causes, or other non job-related solicitations.
The Company reserves and intends to exercise the right to review, audit, intercept, access, disclose, and use all messages created, received, or sent over its e-mail system for any purpose. The contents of e-mail may be disclosed and used by the company to protect its rights and/or property without the permission of the employee, in the company’s discretion.
The confidentiality of any message should not be assumed. Even when a message is erased, it is still possible to retrieve and read that message. Further, passwords for security do not guarantee confidentiality. All passwords must be disclosed to the company or they are invalid and cannot be used.

Employees not involved in maintenance or operation of the company’s e-mail system are not authorized to retrieve or read any e-mail not sent to them. Any exception to this policy requires the approval by senior management of the company.
Internet
The company’s computer network, including its connection to the Internet, is to be used for business-related purposes. Any unauthorized use of the Internet is strictly prohibited. Unauthorized use includes, but is not limited to, connecting, posting, or downloading pornographic material; engaging in computer “hacking” and other related

You May Also Find These Documents Helpful

  • Better Essays

    A lot of networks have an email service, which allows people to communicate with each other. For a company, this is an advantage because employees can share sensitive information privately within the network.…

    • 1327 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Mail may have confidential information. It may contain personal information about employees or contain business secrets such as names and other personal details of customers.…

    • 2175 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    This policy applies to all Richman Investment employees, contractors, vendors and agents with a Richman Investment -owned or personally-owned computer or workstation used to connect to the Richman Investment network. This policy applies to remote access connections used to do work on behalf of Richman Investment including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    * Remote access must be secure and strictly controlled. Enforcement of control will be via password authentication or private/public keys with strong pass-phrases.…

    • 399 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Emails can be used to send information to individuals or a whole company, there are many different facilities within email software that can ensure the recipient has read the email this is important if the email contained time critical information. Also as email can be used as a legal form of communication it can be used to send contractual information and purchase orders.…

    • 436 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Leg 500 Assignment 1

    • 939 Words
    • 4 Pages

    Emails are something that’s getting sent on a daily basis all day every day. With having to set up email accounts, which ask for your social security numbers are basically your fingerprint, is an open door for people to find out any information they want to about you. Typically, some companies use company email addresses for memos that need to get to employees or company executives or any personal emails that need to be shared. With company emails come company email policies that will explain why the emails were provided and what is not acceptable content to pass through email. In the Michael A. Smyth v. The Pillsbury Company case, Mr. Smith and another employee were terminated for exchanging emails that made threats to sales managers and made rude comments about certain company events. Mr. Smith sued the Pillsbury Company for violating public policy by committing a tort known as “invasion of privacy”. In the policy, Pillsbury stated that all employee emails were going to remain confidential and privileged including plaintiff. On these grounds, Smith thought he had a case against the Pillsbury Company, but as the defendant (Pillsbury) pointed out, the company wants to keep their employees safe so the frequent email checks to ensure that…

    • 939 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Every single last employee of Richman Investment is truly encouraged to use the internet only where such use is required and where it is in step necessary and with the business of this company in mind. The tools and services belong to Richman Investments and therefore reserve the right to screen any and all internet traffic including but not limited to emails and any data launched or acknowledged. Exploiting Richman Investment hardware, software and/or company-based internet to hack into unapproved websites is strictly prohibited. The use of any and all torrent software or sites is unacceptable on any network, owned and/or used by Richman Investment as a result of its high risk of misuse and or exploitation. No accessing or distributing of improper or tasteless material on the internet owned or operated by Richman Investments. Violation of this instruction will result in involuntary and immediate termination. Any and all downloads completed through the use of the internet must be inspected before opening or accessing. Operating Richman Investments hardware, software and or internet to establish any sort of fraud, and/or software, film or music piracy is strictly forbidden. All…

    • 882 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Employees are not allowed to use the internet whilst working however permitted employees whose roles need internet access and email are, if it’s answering customer enquiries or complaints.…

    • 687 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Companies have increased productivity, decreased costs and found new marketing methods using email to attract new customers and keep previous ones up to date on product changes, information sales etc. This helps a work group to communicate to each other affectively and easily keeping all party’s up to date. The advantages of email in business can be seen in small and large organizations. Due to the fast speed of the Internet this allows businesses to work at a faster pace and communicate more effectively. Decreased cost and speed is some of the business advantages of using email. A business might want to limit how an employee’s uses email during work hours to prevent lawsuits from someone outside the company and by not using emailing for personal use during business hours would bring up better productivity from the employees. There is a cost savings as well because of employees may receive an email message that was infected with a virus and when it is opened it then spreads to the computer and then to the network that infects all the other workstations. Some of these email viruses also send messages back out by using your contact/address book. This costs the company as they try and control the virus and ensure none of the other workstations get infected. An emails path, after it leaves an organization, is usually meant to go to a certain person or persons, but can end up spread throughout the internet by hackers. This is non-encrypted text that is routed from your organization back to their Internet provider through routers and hubs that typically routes to other internet providers and back to the person or persons. Since there are so many locations a hacker can capture your open email message and use it wrongly.…

    • 654 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. No harassing, indecent, profane, abusive, obscene, vulgar, intimidating, or other offensive language or material may be sent or received by email, voice mail, or other forms of electronic communication. Any employees who encounters or receives such material must report the incident to his or her supervisor, manager, or to human resources.…

    • 336 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The scope of this policy includes all users who have access to company-owned or company-provided computers or require access to the corporate network and/or systems. This policy applies not only to employees, but also to guests, contractors, and anyone requiring access to the corporate network. Public accesses to the company’s externally-reachable systems, such as its corporate website or public web applications, are specifically excluded from this policy.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Email is one of the best and worst techinque the world have ever got but come with problems. Email is good because it fast relieable but any one can forward it to your best or worst friend or even to some one you dont want to see it. Sending the wrong Email can land you in jail and all Email dont have to be read. Spam Emails dont have to be read because it be junk mail. Its never ok to fire someone via emai because its can lead to a lawsuit. So all they saying is never send stuff though email you never want people to see or…

    • 110 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Any time a company allows employees access to their email system, the organization 's assets, future and reputation are at risk (techtarget.com, 2004). As a result it is important that a company email policy be created and implemented. This policy will include: the purpose of emails, the ownership of emails, email usage, sensitive and confidential materials, prohibited content in emails, virus checking archiving emails and violations to the email policy. The implementation of this policy will minimize the legal risk to both the company and individuals involved.…

    • 1148 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Emails are a very important component of any business organization and all the business matters. Depending upon the email, a deal is signed, various other works are done. Emails also lie to be a record of all the conversation of an individual with other on the official grounds.…

    • 528 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The principles of the company and productivity are things that must be established, and the employees must fulfill; some filters can be used so they don’t have access to time-wasting or inappropriate sites. However, they can not interfere in personal emails or private matters, because it has nothing to do with the good of the…

    • 1064 Words
    • 5 Pages
    Good Essays