Preview

Acceptable Use Policy

Good Essays
Open Document
Open Document
622 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Acceptable Use Policy
To Whom It May Concern:

Thanks for all of your hard work and dedication to the company. We at MGI appreciate the level of gratitude that all of you put forth to make this company a driving force. Our major concern is that all employees in our company understand and comply with company policy. This Acceptable Use Policy (AUP) sets forth the Company’s policy with regard to the use of Autosource Group, Inc. (AGI) Computer and Network Resources. You, the user, are ultimately responsible for your actions in accessing and using Network Resources. As a user of AGI Network Resources, you are expected to review and understand the guidelines and procedures in this document.

SCOPE

This policy applies to all AGI hourly associates who will have
…show more content…
While use of AGI Network Resource is solely for Company business, some incidental personal use may be permissible, particularly during the employee’s personal time. Personal access to the Internet within reasonable limits is also allowed. Employees do not have a reasonable expectation of privacy with respect to their use of the Company’s Network Resources, and the Company reserves the right to monitor the employees’ use of Network Resources, including accessing files/communications, as deemed appropriate by the Company and in compliance with all applicable laws (HMS Host handbook, …show more content…
AGI computers must not be used with intentions of misuse and/or abuse of any AGI assets.

* Illegal or Indecent Use: Using AGI network Resources for illegal, harassing, vandalizing, indecent, or inappropriate purposes (including accessing, sorting, or viewing pornographic, indecent, or otherwise inappropriate material), or in support of such activities is prohibited. Inappropriate use includes any violations of generally accepted social standards for use of publicly-owned and operated equipment (HMS Host handbook, n.d).

Any violation of this AUP may result in the suspension or termination of your access to the resources and/or disciplinary actions. Each employee is required to adhere to the AGI Company Code of Ethical Conduct which is accessible on the Human Resources Intranet/Portal site, on the Compliance menu. We do appreciate your time and effort to keep this company first. If you need to talk with me personally, you can contact me at 404-567-9110 Colette Andrews, Vice

You May Also Find These Documents Helpful

  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Internet use at Richman is only authorized to conduct Company business only. Internet use can easily allow hackers to see confidential Company information and allow viruses. This allows the hackers to get passwords and other important things. Which is why we want the staff at Richman’s to only use the internet for business only and business only sites. Employees can only check their business…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2640 Lab 7 SC

    • 2232 Words
    • 17 Pages

    The company’s home office in Gadsden (GAD) provides services to branch offices such as the Birmingham (BHM) office. These offices have some minor security and performance concerns. You will implement standard ACLs as a simple and effective tool to control traffic based…

    • 2232 Words
    • 17 Pages
    Satisfactory Essays
  • Good Essays

    Employees will be also using the workstation domain is where they will connect to the company’s network. Tight security and access controls will be enforced on company equipment and users must have proper access rights…

    • 539 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    2. General access to the Internet for recreational use by immediate household members through the Richman investments Network on personal computers is permitted for employees that have flat-rate services. The Richman investments employee is responsible to ensure the family member does not violate any Richman investments policies, does not perform illegal activities, and does not use the access for outside business interests. The Richman investments employee bears responsibility for the consequences should the access is misused.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    As with all network resources there is always the possibility of the system being hacked or misuse of the data by trusted employees. In this case, the company must give privileges to trust worthy employees to have access which can be vital to the company reputation. System monitoring is recommended to spot unusual network traffic and server requests. Along with user permissions, strong passwords and Mac address filters will help to mitigate these issues that might arise if the security of this system compromised.…

    • 951 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The LAN to WAN acceptable use Policy will go hand in hand with the roles and tasks parts of the user domain. Users would be given access to certain systems, applications, and data depending on their access rights. The AUP is like a rulebook that employees need to follow when using an organization’s IT assets and if they are violated it could be grounds for termination. The AUP will set grounds on employees to understand that they are responsible for any and all actions on an organization’s IT assets. In particular to organizations…

    • 411 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This document establishes computer usage guidelines for the Regional ABC Credit union/bank Systems Division support staff in the course of their job duties on Regional ABC Credit union/bank Credit union/bank Computer Systems. These guidelines incorporate the elements of the Regional ABC Credit union/bank Systems Division Special Access Agreement and the Acceptable Use Statement of Regional ABC Credit union/bank Systems Division Computing Resources. These guidelines are intended to protect the rights and privacy of Regional ABC Credit union/bank Systems Division clients as well as those of Regional ABC Credit union/bank Systems Division support staff. Any Corporate Headquarters guidelines or policies will take precedence over these guidelines.…

    • 1260 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    why you should listen

    • 496 Words
    • 2 Pages

    media does not constitute an official endorsement or approval of the use of such commercial hardware or…

    • 496 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Consent to search and monitoring of computers, media, and communications used by the employee in the performance of his or her duties for the company.…

    • 974 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Investments. An Acceptable Use Policy (AUP) or fair use policy, is a set of rules applied by the owner…

    • 430 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This User Agreement governs all of your use of our internet-delivered work collaboration service (the “Online Service”),…

    • 4335 Words
    • 18 Pages
    Good Essays
  • Good Essays

    This policy is intended to meet the control requirements outlined in SEC502, and SEC501, Section 8.3 Audit and Accountability Family, Controls AU-1 through AU-11. All VITA employees (classified, hourly, or business partners) as well as all VITA systems classified as sensitive”. (www.vita.virginia.gov).…

    • 760 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    HRM3704

    • 5092 Words
    • 17 Pages

    [To be issued by employer to staff governing authorised use of internet and email facilities assuming that limited personal use is permitted]…

    • 5092 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    Thesis

    • 10911 Words
    • 44 Pages

    Also the system allows the Human Resources Department to add, view and update the employee’s information through internet. The Manager will have access to view his employee(s) information.…

    • 10911 Words
    • 44 Pages
    Powerful Essays
  • Powerful Essays

    Young, K. (2010). Policies and procedures to manage employee Internet abuse. Computer in Human Behavior 26 (2010).…

    • 1401 Words
    • 5 Pages
    Powerful Essays

Related Topics