Preview

Unit 4 Assignment 2: Acceptable Use Policy (AUP) Definition

Good Essays
Open Document
Open Document
696 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 4 Assignment 2: Acceptable Use Policy (AUP) Definition
E-mail
All messages composed, sent, received, or stored on the e-mail system are and remain the property of the company. They are not the private property of the employee. Personal e-mail accounts are not to be used on the company’s computer system.
The e-mail system is not to be used to send offensive, sexually suggestive, obscene, lewd, demeaning, or disruptive messages. This includes, but is not limited to, messages that are inconsistent with the company’s policies on equal employment opportunity, anti-discrimination, and anti-harassment (including sexual harassment). Moreover, the e-mail system is not to be used to solicit or proselytize for commercial ventures, religious or political causes, or other non job-related solicitations.
The Company reserves and intends to exercise the right to review, audit, intercept, access, disclose, and use all messages created, received, or sent over its e-mail system for any purpose. The contents of e-mail may be disclosed and used by the company to protect its rights and/or property without the permission of the employee, in the company’s discretion.
The confidentiality of any message should not be assumed. Even when a message is erased, it is still possible to retrieve and read that message. Further, passwords for security do not guarantee confidentiality. All passwords must be disclosed to the company or they are invalid and cannot be used.

Employees not involved in maintenance or operation of the company’s e-mail system are not authorized to retrieve or read any e-mail not sent to them. Any exception to this policy requires the approval by senior management of the company.
Internet
The company’s computer network, including its connection to the Internet, is to be used for business-related purposes. Any unauthorized use of the Internet is strictly prohibited. Unauthorized use includes, but is not limited to, connecting, posting, or downloading pornographic material; engaging in computer “hacking” and other related

You May Also Find These Documents Helpful

  • Powerful Essays

    Mail may have confidential information. It may contain personal information about employees or contain business secrets such as names and other personal details of customers.…

    • 2175 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Every single last employee of Richman Investment is truly encouraged to use the internet only where such use is required and where it is in step necessary and with the business of this company in mind. The tools and services belong to Richman Investments and therefore reserve the right to screen any and all internet traffic including but not limited to emails and any data launched or acknowledged. Exploiting Richman Investment hardware, software and/or company-based internet to hack into unapproved websites is strictly prohibited. The use of any and all torrent software or sites is unacceptable on any network, owned and/or used by Richman Investment as a result of its high risk of misuse and or exploitation. No accessing or distributing of improper or tasteless material on the internet owned or operated by Richman Investments. Violation of this instruction will result in involuntary and immediate termination. Any and all downloads completed through the use of the internet must be inspected before opening or accessing. Operating Richman Investments hardware, software and or internet to establish any sort of fraud, and/or software, film or music piracy is strictly forbidden. All…

    • 882 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    This policy applies to all Richman Investment employees, contractors, vendors and agents with a Richman Investment -owned or personally-owned computer or workstation used to connect to the Richman Investment network. This policy applies to remote access connections used to do work on behalf of Richman Investment including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    * Remote access must be secure and strictly controlled. Enforcement of control will be via password authentication or private/public keys with strong pass-phrases.…

    • 399 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    XCOM 285 week x

    • 501 Words
    • 4 Pages

    Determine if the content is appropriate for a workplace setting. If it is, explain why. If not, identify the errors made and rewrite the e-mail, to be appropriate.…

    • 501 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Unit 210 handling mail

    • 510 Words
    • 3 Pages

    Mail may have confidential information. It may include personal information about employees or contain business secrets such as the names of customers and confidential information related to the business, customers and clients. Also, mails and packages have to be checked for suspicious features. So security procedures will have to be followed while dealing with mails and packages.…

    • 510 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Companies have increased productivity, decreased costs and found new marketing methods using email to attract new customers and keep previous ones up to date on product changes, information sales etc. This helps a work group to communicate to each other affectively and easily keeping all party’s up to date. The advantages of email in business can be seen in small and large organizations. Due to the fast speed of the Internet this allows businesses to work at a faster pace and communicate more effectively. Decreased cost and speed is some of the business advantages of using email. A business might want to limit how an employee’s uses email during work hours to prevent lawsuits from someone outside the company and by not using emailing for personal use during business hours would bring up better productivity from the employees. There is a cost savings as well because of employees may receive an email message that was infected with a virus and when it is opened it then spreads to the computer and then to the network that infects all the other workstations. Some of these email viruses also send messages back out by using your contact/address book. This costs the company as they try and control the virus and ensure none of the other workstations get infected. An emails path, after it leaves an organization, is usually meant to go to a certain person or persons, but can end up spread throughout the internet by hackers. This is non-encrypted text that is routed from your organization back to their Internet provider through routers and hubs that typically routes to other internet providers and back to the person or persons. Since there are so many locations a hacker can capture your open email message and use it wrongly.…

    • 654 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Email is one of the best and worst techinque the world have ever got but come with problems. Email is good because it fast relieable but any one can forward it to your best or worst friend or even to some one you dont want to see it. Sending the wrong Email can land you in jail and all Email dont have to be read. Spam Emails dont have to be read because it be junk mail. Its never ok to fire someone via emai because its can lead to a lawsuit. So all they saying is never send stuff though email you never want people to see or…

    • 110 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The scope of this policy includes all users who have access to company-owned or company-provided computers or require access to the corporate network and/or systems. This policy applies not only to employees, but also to guests, contractors, and anyone requiring access to the corporate network. Public accesses to the company’s externally-reachable systems, such as its corporate website or public web applications, are specifically excluded from this policy.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Good Essays

    1. As an employee of Richman Investments, you are responsible for using good judgment regarding the use of internet access. In ordnance with the policies set forth by Richman Investments resources may not be used for any unlawful or prohibited purpose. For extra security Richman Investments will monitor all systems, equipment, and network using the Audit Policy. Any devices that might interfere with the Richman Investments network will be immediately disconnected. Firewalls must be turn on at all times.…

    • 441 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    1. All communication documents or messages created or contained within the systems are company policy and records. The communication systems are to be used for business purposes only. Employees should not expect that any communication created, sent or received on the communication systems is private. We have the right to monitor, review, access, delete, reproduce, or disclose anything created, sent, or received on the communication systems. At any time, without notice, we have the right to disclose any communication to law enforcement officials without any notice.…

    • 336 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Employees are not allowed to use the internet whilst working however permitted employees whose roles need internet access and email are, if it’s answering customer enquiries or complaints.…

    • 687 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Emails are a very important component of any business organization and all the business matters. Depending upon the email, a deal is signed, various other works are done. Emails also lie to be a record of all the conversation of an individual with other on the official grounds.…

    • 528 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The ownership of emails: All emails created, sent and received using the company’s email system is property of the company. The company reserves the right to monitor, access and disclose all or in part of any email messages within the company email system. All emails may be monitored by authorized company personnel for violations of law, breaches of company policies and any other reason deemed appropriate by the company.…

    • 1148 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The principles of the company and productivity are things that must be established, and the employees must fulfill; some filters can be used so they don’t have access to time-wasting or inappropriate sites. However, they can not interfere in personal emails or private matters, because it has nothing to do with the good of the…

    • 1064 Words
    • 5 Pages
    Good Essays