Preview

Why Establish an Acceptable Usage Policy?

Powerful Essays
Open Document
Open Document
2473 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Why Establish an Acceptable Usage Policy?
| Why Establish an Acceptable Usage Policy? | | By | Stephen Lyons | | |

|

Background

For the Past 15 years, I have been supporting small businesses with computer problems, ranging from desktop support to network and server integration. I have been a Microsoft® Certified Professional since 1999, and a Microsoft® Certified Small Business Specialist for over a year. I ran my own company, Lyons Den Computer Services, Inc., from 1992-2007. I exclusively serviced businesses with 3-25 workstation and servers. I recently started a new position where I am working with even larger organizations, with over 100 computers per location. One thing most of these companies have in common is a great dependence on technologies such as the internet, email and network connections to the world. Unfortunately, another thing they have in common is a lack of understanding of the depth of security concerns they create by taking advantage of these technologies. One of the largest security holes is often not a missing piece of hardware or software, but a missing piece of documentation that should be in place to protect their investment in all their equipment, personnel and good company name. I am referring to an Acceptable Use Policy for their network and Internet usage.
Purpose

I intend to show company management just how important this document can be, and why they need one, as well as the importance of keeping it updated. I will show examples of problems a lack of policy can create, and show why there is really no “one size fits all” boilerplate policy they can just copy. The company’s culture should have an influence on the policy.
Scope
I intend to cover the main reasons an Acceptable Use Policy in justified and necessary. I will also give examples for consideration of the need for the policy to be updated often and to be ingrained and enforced to the employees.
Why Establish an Acceptable Usage Policy?

The Internet and Productivity
As Internet and



Cited: "Bytes for beginners." NEA Today 14.4 (1995): 23. "Confusion over Internet use in the workplace;." M2PressWIRE 16 Apr. 2007. 13 July 2007 http://www.m2.com Grossman, Mark Langin, Daniel J. "Employer Liability for Employee Use of Peer-to-Peer Technology." Journal of Internet Law 9.5 (2005): 17. P Palmgren, Keith

You May Also Find These Documents Helpful

  • Good Essays

    Acceptable Use Policy

    • 725 Words
    • 3 Pages

    Richman Investments ACCEPTABLE USE POLICY Information Security Policy Number 12345 Effective 10/15/2013` I. Introduction An Acceptable Use Policy (AUP) is an organization-wide policy that defines what is allowed and what is not allowed regarding use of Information Technology (IT) assets by employees. The following policy is to be followed by all employees of Richman Investments, authorized individuals, vendors, and contractors who use any information technology (IT), electronic, or communication…

    • 725 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Acceptable Use Policy

    • 1267 Words
    • 6 Pages

    Acceptable Use Policy Artiesha Artis CIS 462 Security Strategies and Policy Professor Darrell Nerove October 20, 2012 Working in many different arenas while pursuing my degree in Computer Security has opened my eyes to many things, one thing that I have noticed is that some companies felt that they were immune to data breaches. I have worked in smaller organizations that just didn’t have the knowledge to protect their network against security breaches. One inexpensive and very productive…

    • 1267 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Acceptable Use Policy

    • 1915 Words
    • 8 Pages

    Acceptable Use Policy Purpose. The purpose of this Acceptable Use Policy is to provide guidelines which will be applied in determining acceptable use of this Web site, and to notify you of the terms of this service. As a user of this service, you agree to comply with this policy, the stated acceptable uses and the terms of service. Online Conduct. The intent of this policy is to make clear certain uses, which are and are not appropriate, not to exhaustively enumerate all such possible uses…

    • 1915 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Acceptable Use Policy

    • 521 Words
    • 3 Pages

    An acceptable use policy (AUP), to me is something that is very important to the classroom. Students need to know what is expected of them and their actions while using technology. Having an AUP for your classroom establishes rules so students know how they are expected to behave because the instructor cannot be constantly watching everyone. The students benefit from this because they know what the rules are and what is expected of them. This reduces the amount that students misuse the technology…

    • 521 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Acceptable Use Policy

    • 622 Words
    • 3 Pages

    our company understand and comply with company policy. This Acceptable Use Policy (AUP) sets forth the Company’s policy with regard to the use of Autosource Group, Inc. (AGI) Computer and Network Resources. You, the user, are ultimately responsible for your actions in accessing and using Network Resources. As a user of AGI Network Resources, you are expected to review and understand the guidelines and procedures in this document. SCOPE This policy applies to all AGI hourly associates who will…

    • 622 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ict Acceptable Use Policy

    • 5292 Words
    • 22 Pages

    ICT Acceptable Use Policy Staffordshire County Council ICT Acceptable Use Policy Classification: Internal Use Only Document Management Document Disclaimer This document is issued only for the purpose for which it is supplied. Document Owner This document is produced and owned by Staffordshire County Council (SCC). It is the responsibility of the Information Security Team to review and update the document annually and whenever necessary. Document Control This document is controlled and maintained…

    • 5292 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    Why Is Torture Acceptable

    • 1705 Words
    • 7 Pages

    Is Torture Acceptable? Catholic Perspective If a bomb is about to explode in New York and the police have captured the man responsible, are they morally allowed to torture him in order to get the diffusion codes? This is a topic of interest in the government and public right now, as people are debating whether or not torture is ethically right. Many people in the United States, especially in the military, claim torture can be very effective in gaining information, and that it can even save lives…

    • 1705 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    APPENDIX A: Acceptable Use Security Policy The following document is a sample Acceptable Use Security Policy using the outline identified in the Security Policy Template. The purpose of this sample document is to aid with the development of your own agency Acceptable Use Security Policy by giving specific examples of what can be performed, stored, accessed and used through the use of your departments computing resources. Section 1 - Introduction Information Resources are strategic assets…

    • 1362 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    NT 2580 Marius Ouambo Teacher: Mr. Timothy Tacker Unit 5 Assignment 2: Define an Acceptable Use Policy (AUP) April 25, 2015 The following are Acceptable Use Policy or AUP for rolling Network Access and Internet Usage for Richman Investments. The qualification for the usage of the company network composed of filtering policies for traffic in the network and the usage of the internet are spelled out in this AUP. The use of the Internet is a privilege, not a right and inappropriate use will…

    • 882 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 5 Assignment 2 – Define an Acceptable Use Policy (AUP) Richman Investments holds requirements for the usage of the company network including filtering policies for network traffic LAN – WAN is where the IT infrastructure links to a wide area network and internet. For Security (Administrators and Managers) Security monitoring controls for intrusion Apply an email server antivirus (also applies for attachments) Disablement for ping, probing, and port scanning on all exterior IP devices…

    • 332 Words
    • 2 Pages
    Satisfactory Essays