Top-Rated Free Essay
Preview

ABC Credit Union

Satisfactory Essays
337 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ABC Credit Union
ABC Credit Union
Organization-Wide Acceptable Use Policy
Policy Statement
This Acceptable Usage Policy covers the security and use of all ABC Credit Union’s
Information and IT equipment. It also includes the use of email, internet, voice and mobile IT equipment. This policy applies to all ABC Credit Union employees, contractors and agents.
Purpose\Objectives
The purpose of this policy is to provide a description of the acceptable use of our computer systems and internet service. The objectives of this policy are:
* To keep the business process in a high working order in order to achieve the maximum amount of profit gained.
* To keep morale high, so that employees are constantly being rewarded. That’s keeps the employees coming to work on time.
Scope
The scope of the policy includes users, computers, storage media, and internet usage.
Standards
All computer systems will be imaged to the following standards:
* Allow Employee to choose a background pictures
* No sounds
* 800x600 screen resolution
No employees will be granted administrator rights on their computer system in order to prevent any fun software from being downloaded. These standards are in place to provide a excellent work experience

Internet Use Policy
The internet will only be used for business purposes and not entertainment. Our company proxy server has been configured to block access to the following types of websites:
Social Media Sites (i.e. Facebook, Myspace, Twitter)
Mature Content Sites (i.e. Pornhub, Youporn)
Streaming Sites (i.e. Youtube, Netflix)
The Company will provide two laptop in the break room for personal use.
The network traffic will be monitored daily and our IT department reserves the right to amend this internet use policy at any time without notification.
Procedures
This policy will be implemented by our IT staff and will be enforced.
Guidelines
If there is any violation of this policy will be documented and be reviewed. The consequences for these actions will follow:
Verbal and written warning
Suspension without pay
Termination
That depends on the severity of the action of the employee

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | |There is a procedure in place to monitor and review the policy on a regular basis | | | |…

    • 528 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The user domain contains the employees that will be accessing resources in the network. Users access systems, applications, and data within the rights and privileges defined by the acceptable use policy. The AUP must be followed at all time or the user may be terminated. There are threats ranging from lack of awareness to blackmail and extortion. All employees are responsible for their own actions when using the network. The users will all be expected to read and abide by the acceptable use policy. (Kim & Solomon, 2012)…

    • 539 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    This policy applies to all Richman Investment employees, contractors, vendors and agents with a Richman Investment -owned or personally-owned computer or workstation used to connect to the Richman Investment network. This policy applies to remote access connections used to do work on behalf of Richman Investment including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    General access to the Internet by household members via the Richman Investments network will be permitted, and should be used responsibly, such that all Richman Investments standards and guidelines are enforced for the duration of Internet activity. The Richman Investments agent, vendor, contractor, or employee will bear any responsibilities and consequences for any misused access.…

    • 399 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 4222-307 Answers

    • 767 Words
    • 4 Pages

    The Internet and Email Acceptable Use Policy provides all staff with access to email and internet a framework and set of rules and regulations to follow, to ensure that they know what they can and cannot enter or send…

    • 767 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    It/205 Week 9 Quiz

    • 596 Words
    • 3 Pages

    Instructions: Please place your name and the name of the class where indicated and place your answers where required. Once completed the Quiz should be uploaded to your Assignment Forum. Please make every effort not to change the formatting of this Quiz. Thank you.…

    • 596 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 4 assignment 2

    • 303 Words
    • 2 Pages

    In addition to those items listed above, personal downloads are to be strictly prohibited. If you should have need of a program or utility which is not accessible in your computer system, then you must submit a request to the IT department identifying the service or application requested, why the application is needed.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It 255

    • 629 Words
    • 3 Pages

    3. Incidental personal use of electronic mail, Internet access, fax machines, printers, and copiers is restricted to Richman Investments approved users…

    • 629 Words
    • 3 Pages
    Good Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Safety Policy” covering the filtering discussed above. For minors, the policy must also address monitoring of online activities, the safety and security of all forms of direct electronic communications, unauthorized online access, and unauthorized disclosure of personal identification information.…

    • 1205 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Every setting should always have policies that encourage effective and clear communication when sharing information. Policies and procedures should include policies relating to:…

    • 952 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    8. Guide to Developing a Policy and Procedure Manual Page 2 www.ahmrc.org.au/policies/index.html (Accessed on 19/10/2013)…

    • 3496 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    1. As an employee of Richman Investments, you are responsible for using good judgment regarding the use of internet access. In ordnance with the policies set forth by Richman Investments resources may not be used for any unlawful or prohibited purpose. For extra security Richman Investments will monitor all systems, equipment, and network using the Audit Policy. Any devices that might interfere with the Richman Investments network will be immediately disconnected. Firewalls must be turn on at all times.…

    • 441 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The company’s computer network, including its connection to the Internet, is to be used for business-related purposes. Any unauthorized use of the Internet is strictly prohibited. Unauthorized use includes, but is not limited to, connecting, posting, or downloading pornographic material; engaging in computer “hacking” and other related…

    • 696 Words
    • 3 Pages
    Good Essays