INTENT: Introduction to Information Security Unit 4 Assignment 2 4/12/2014 Acceptable Use Policy (AUP) Definition Irishman Investments Acceptable Use Policy The use of company-owned computing devices and networks is a privilege, instead of a right, and inappropriate use can result in revocation of such privilege. Employees must remember that their behaviors represent the actions of the company, and the respect to the rights of others and all relevant laws, regulations and contracts.
Employees also must be aware of that their inappropriate uses may lead to catastrophic results on the company and other employees. This acceptable use policy grants the right for users to gain access to the network of Irishman Investments and also binds the said user to follow and abide accordingly to the agreements set forth for network access provided below. Acceptable Uses: General and authorized uses for achieving the objectives of their job description, and occasional personal communications by using email.
Don’t waste your time!
Order your assignment!
Unacceptable Uses: For Internet Use, the following actions are prohibited: Accessing, downloading, storing, recording sites that are offensive, obscene, defamatory, abusive or otherwise unlawful Knowingly downloading any trials irrelevant to their work Conducting actions irrelevant to their work, such as playing games, listening to music, watch videos, and etc. Internet usage should be conducted for the company business only.
Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information. The use of personal internet must be limited and only to be used for web based emails only with the approval of your Supervisor or Manager. For Email Use, the following actions are prohibited: Accessing inappropriate sites or inappropriate e-mail Transmitting private mass mailings Transmitting messages disclosing personal information without authorization.
Sending multiple unsolicited electronic mail messages or “mail-bombing” – to one or more recipient; Sending unsolicited commercial e-mail, or unsolicited electronic messages directed primarily at the advertising or promotion of products or services; Sending unsolicited electronic messages with petitions for signatures or requests for charitable donations, or sending any chain mail related materials; Sending bulk electronic messages without identifying, within the message, a reasonable means of opting out from receiving additional sausages from the sender; Sending electronic messages, files or other transmissions that exceed contracted for capacity or that create the potential for disruption of the AT network or of the networks with which AT interconnects, by virtue of quantity, size or otherwise; Using another site’s mail server to relay mail without the express permission of that site; Using another computer, without authorization, to send multiple e-mail messages or to retransmit e-mail messages for the purpose of misleading recipients as to the origin or to conduct any of the activities prohibited by this AUP; Using IP addresses that the Customer does not have a right to use; Collecting the responses from unsolicited electronic messages; Maintaining a site that is advertised via unsolicited electronic messages, regardless of the origin of the unsolicited electronic messages; Sending messages that are harassing or malicious, or otherwise could reasonably be predicted to interfere with another party’s quiet enjoyment of the IP Services or the Internet (e. G. Through language, frequency, size or otherwise); Using distribution lists containing addresses that include those who have opted out; Sending electronic messages that do not accurately identify the sender, the sender’s return address, the e-mail address of origin, or other information contained in the subject line or header; Falsifying packet header, sender, or user information whether in whole or in part to mask the identity of the sender, originator or point of origin; Using redirect links in unsolicited commercial e-mail to advertise a website or service; Posting a message to more than ten (10) online forums or newsgroups, that could reasonably be expected to generate complaints; Intercepting, redirecting or otherwise interfering or attempting to interfere with e-mail intended for third arties; Knowingly deleting any author attributions, legal notices or proprietary designations or labels in a file that the user mails or sends; Using, distributing, advertising, transmitting, or otherwise making available any software program, product, or service that is designed to violate this ASAP or the ALGA of any other Internet Service Provider, including, but not limited to, the facilitation of the means to spam. Policy Guidelines: The use of peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers is strictly forbidden.
Downloading executable programs or software room any websites, even known sites, will not be tolerated The user will not redistribute licensed or copyrighted material without first receiving authorization Do not export internal software or technical material in violation of export control laws Introduction of malicious programs into networks or onto systems will not be tolerated Do not attempt to gain access to unauthorized company resources or information from external or internal sources Port scanning or data interception on the network is forbidden Legitimate Users shall not have a denial of service or circumventing of authentication Use of programs, scripts, or nomads to interfere with other network users is strictly prohibited.