Preview

Defining an Excceptable Use Policy

Satisfactory Essays
Open Document
Open Document
411 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Defining an Excceptable Use Policy
CNG-132
Defining and Acceptable Use Policy

Acceptable Use Policy
An Acceptable Use Policy (AUP), acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager of a network, website, service, or large computer system that restrict the ways in which the network, website or system may be used. AUP documents are written for corporations, businesses, universities, schools, internet service providers, and website owners, often to reduce the potential for legal action that may be taken by a user, and often with little prospect of enforcement.
The acceptable use policy (AUP), To fully explain the acceptable use policy would mean to start from the beginning, the user domain. The user domain is the employee or people within an organization who is granted access to the information system for the organization. There are roles and tasks, responsibility, and accountability that go into an acceptable use policy for the user domain. Within the user domain is the access of LAN to WAN, web surfing, and internet. LAN to WAN is the activities between and firewall LAN to WANs, routers, intrusion, detection, and workstations. Web surfing determines what a user can do on company time with company resources. Internet is when the user has access to the internet what types of controls should the organization have on the certain internet sites being accessed. Although they seem to be alike they are their own entity. The LAN to WAN acceptable use Policy will go hand in hand with the roles and tasks parts of the user domain. Users would be given access to certain systems, applications, and data depending on their access rights. The AUP is like a rulebook that employees need to follow when using an organization’s IT assets and if they are violated it could be grounds for termination. The AUP will set grounds on employees to understand that they are responsible for any and all actions on an organization’s IT assets. In particular to organizations

You May Also Find These Documents Helpful

  • Good Essays

    The User Domain will enforce an acceptable use policy (AUP) to define what each user can and cannot do with any company data shall he or she have access to it. As well as with company users, any outside contractor or third-party representatives shall also need to agree and comply with the AUP. All users must be properly identified and sign this AUP prior to gaining any access whatsoever to the company network. No exceptions. Any violation will be taken up with company executives and/or the authorities to assess further punitive action.…

    • 471 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Policy Process Part I

    • 1296 Words
    • 6 Pages

    Women’s health care needs will always maintain a policy status as technology and changes in medicine or services occur. As long as women continue to dominate stakeholder status, reforms of programs are very much in need so that every women regardless of status can receive quality care without high cost, restrictions, or refusals for pre-existing conditions “because being a women is not a pre-existing condition” (KaiserEDU.org, 2012a, p. 1). So to understand the processes of how policies affect women’s health, the following explanation of the three stages will provide insight into how a topic might become a policy or fail to become a policy that affects women’s health care.…

    • 1296 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP). Informing the users will be of what is acceptable and unacceptable use of the system. This layer also needs constant monitoring.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Ip Networking

    • 327 Words
    • 2 Pages

    The User Domain defines the people who have permissions to a company’s information system. This domain contains all of the user information and will enforce an Acceptable Use Policy (AUP) that will define what each user has permissions to do with any company data that they may have access to. This domain is not the strongest link in any company’s infrastructure.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 2 Lan

    • 272 Words
    • 2 Pages

    Define a LAN-to-WAN, Internet, and Web surfing AUP that restricts usage of the company’s Internet connection and permits the company to monitor usage of the corporate Internet connection. Carefully evaluate the implications of each policy and how implementations might impact the IT infrastructure, both positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to the legitimate users and how it might bring security at the expense of preventing a perfectly legitimate…

    • 272 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    unit 4 assignment 2

    • 303 Words
    • 2 Pages

    After research and careful consideration of some of the other policies listed by other companies such as AT&T, Sprint, T-Mobile, and Verizon Wireless, Richman Investments has come up with the an acceptable use policy (AUP).…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The scope of this policy includes all users who have access to company-owned or company-provided computers or require access to the corporate network and/or systems. This policy applies not only to employees, but also to guests, contractors, and anyone requiring access to the corporate network. Public accesses to the company’s externally-reachable systems, such as its corporate website or public web applications, are specifically excluded from this policy.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    nt1210 lab 7.1-3

    • 420 Words
    • 3 Pages

    1. It’s impractical for an organization to own the entirety of a WAN because it would be to maintain the entirety, it’s to maintain the entirety of a LAN because it’s easier to maintain and…

    • 420 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    Provide at least 3 examples of Network Architecture Controls that help enforce data access policies at LAN-to-WAN Domain level.…

    • 718 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A policy is a file or document that guides the service providers with principles on their how the ways to put their work into practice when working with service users. E.g. behavioural policy…

    • 1090 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    LAN – WAN is where the IT infrastructure links to a wide area network and internet.…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Richman Investments at all times is to establish acceptable and unacceptable use of electronic devices and network resources. All employees of Richman Investments must comply with the rules and regulations for use of the Internet, sending e-mail, going to social media sites, and downloading attachments. The Richman Investments AUP will help achieve these goals.…

    • 441 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    . What are the three fundamental elements of an effective access control solution for information…

    • 321 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Manegerial Policy

    • 1960 Words
    • 8 Pages

    1a) Costco’s CEO stated that the vision for Costco was to give customers the best possible value for their purchase while remaining ethical.…

    • 1960 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    An effective e-mail and Web use policy for a company would comprise of a detailed description of what employees are allowed and prohibited from doing while at work. This policy should allow employees at least 30 minutes a day for personal use. The company can also provide certain computers designated for personal use that their employees can have access to so that when off company time they can use these computers. This may prevent the company from being vulnerable to viruses and hackers because they can be connected to different networks/servers.. The policy can also allow employees to use the internet and e-mail for personal use when on lunch, break or off company time. It is important for the firm to make the work place comfortable and prevent it from feeling like they have no rights. This is why I feel the firm should try to accommodate personal e-mail and internet usage because some employees have very little time and emergencies may arise where they need to use these…

    • 334 Words
    • 1 Page
    Satisfactory Essays