Tuesday, January 29, 2019
Acceptable Use Policy (AUP) Definition Essay
E-mailAll messages composed, direct, received, or stored on the email dodge are and remain the property of the telephoner. They are non the private property of the employee. Personal e-mail accounts are not to be used on the corporations estimator system. The e-mail system is not to be used to send offensive, sexually suggestive, obscene, lewd, demeaning, or disruptive messages. This includes, tho is not limited to, messages that are inconsistent with the callers policies on equal employment opportunity, anti-discrimination, and anti-harassment (including sexual harassment). More everyplace, the e-mail system is not to be used to solicit or proselytize for technical ventures, religious or political causes, or new(prenominal) non job-related solicitations.The Company reserves and intends to exercise the right to review, audit, intercept, access, disclose, and use all messages created, received, or sent over its e-mail system for any purpose. The contents of e-mail may be disclosed and used by the society to protect its rights and/or property without the permission of the employee, in the federations discretion. The confidentiality of any message should not be assumed. Even when a message is erased, it is still possible to chance and read that message. Further, passwords for surety do not guarantee confidentiality. All passwords must(prenominal) be disclosed to the order or they are invalid and cannot be used.Employees not involved in maintenance or operation of the companys e-mail system are not authorized to rule or read any e-mail not sent to them. any(prenominal) exception to this policy requires the approval by senior management of the company. profitsThe companys computer network, including its connection to the Internet, is to be used for business-related purposes. each unauthorized use of the Internet is strictly prohibited. Unauthorized use includes, further is not limited to, connecting, posting, or downloading pornographic mater ial engaging in computer hacking and other related activities attempting to disable or compromise the security of information contained on the companys computers or otherwise employ the companys computers in a manner which interferes with their business purpose. Employees should not send highly confidential information through the Internet without encryption.Anything sent through the Internet passes through a number of different computer systems, all with different levels of security. The confidentiality of messages may be compromised at any augur along the way. Because postings placed on the Internet may display the companys address, make certain before posting information on the Internet that the information reflects the standards and policies of the company. Under no circumstances should information of a confidential, sensitive, or otherwise proprietary nature be placed on the Internet.Information posted or viewed on the Internet may imbed published material. Therefore, r eproduction of information posted or otherwise forthcoming over the Internet may be done only by express permission of the author. Offensive, sexually suggestive, obscene, lewd, demeaning, or disruptive messages are prohibited. This includes, but is not limited to, messages that are inconsistent with the companys policies on equal employment opportunity, anti-discrimination, and anti-harassment (including sexual harassment). Use of the companys e-mail/Internet system from a personal or company-owned computer through company-owned connections are subject to the same policies that apply to use from within company facilities. computersDue to the sensitive nature of computers and the software contained therein, all employees provided with computers may not download, install, alter, or delete any software, programs, and information (i.e., e-mails, spread sheets, databases, Microsoft Word, or other word processing documents) contained on company computers without the express authorizati on of the company. The company reserves the right to inspect or review its computers and the information contained therein at any time without notice or consent.Any employee who violates the companys e-mail/Internet/computer usage policy shall be subject to discipline, up to and including employment termination.ReferenceInternet Acceptable consumption Policy Guidelines . OSA. http//www.osa.state.ms.us/downloads/iupg.pdf (accessed April 17, 2014). Table of Contents. 9781449692438.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment