Topics: Authentication, Access control, Password Pages: 3 (940 words) Published: November 25, 2013
Acceptable Use Policy
The use of the company network, internet, and email services by Richmond Investments employees is permitted and encouraged where the use supports the goals and objectives of the business. However, Richmond Investments has a policy for the acceptable use of the network, internet, and email services where the employee must ensure that they: * Will follow current laws and regulations

* Use of the company network, email and internet in an acceptable manner * Do not create unnecessary business risk to the company by misuse of the network, internet, or email services Unacceptable behavior

The following behavior by any employee is considered to be unacceptable: * Forwarding of company confidential information to external locations * Distributing, disseminating or storing images, text or materials that might be considered indecent, obscene or illegal, considered discriminatory, offensive or abusive, in that the context is a personal attack, or might be considered as harassment * Accessing copyrighted information in a way that violates the copyright * Distribution of unsolicited commercial or advertising material * Intended or unintended introduction of any form of computer virus or malware into the corporate network * Downloading of anything of a personal nature

* The use of internet for any personal use other that checking web-based personal emails Following traffic is not acceptable:
* No peer to peer file sharing or externally reachable file transfer protocol (FTP) servers * No downloading executable files of any kind from software sites * No unauthorized redistribution of licensed or copyrighted material in violation of export control laws * No accessing unauthorized internal resources or information from external sources * No port scanning or data interception on the network

* No denying service or circumventing authentication to legitimate users * No using programs, scripts, or commands to interfere with other network users * No...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • NT2580 Essay
  • NT2580 Project part 1 Essay
  • NT2580 Essay
  • NT2580 Research Paper
  • Essay about Nt2580 Lab 3
  • NT2580 Project part 1 Essay
  • NT2580 Project Part 1 Essay
  • Nt2580 Research Paper

Become a StudyMode Member

Sign Up - It's Free