The Acceptable Use Agreements present the federal and state guidelines and policies that organizations are required to follow with regards to the use of computers (Computer, Email and Internet Usage, 2014). The policy seeks to summarize the up to standard usage of information technology equipment. The guidelines ensure the safety of the employees and the organization. Failure to adhere to these guidelines presents various threats such as cyber attacks, compromising of the system, and legal problems (Doherty, Anastasakis & Fulford, 2011). In this case, the focus is MPC. The Internet, Intranet, and Extranet represent a broad range of computer tools, software, OS, Emails, WWW, as well as the asset of MPC. The systems sole purpose is to serve the interests of the organization and other stakeholders.
According to the Internet Policy, the acceptable practice requires that all individuals acknowledge that they represent the organization. While blogging and using social networking systems, people have an obligation to observe various rules. Even though infrequent usage of MPC system for the purpose of blogging is acceptable, professionalism must be maintained to stick to the set standards. While using the internet, it is undesirable to disclose confidential information of the organization (SANS Institute, 2014). Also, it is unacceptable to share any materials covered by the organizations Confidential Policy. It is deplorable for employees to take part in blogging that tarnishes the reputation of the organization. Also, employees should not introduce malware software to the company system.
During the use of computer systems, the Password Policy must be observed. It is improper use to give access to third parties knowingly or through carelessness when it comes to securing privacy. According to the policy, all computer systems must be secure. It means that a password must be used to secure every aspect of computing machines. Acceptable use requires the employees to log off if the computer is not in use.
With regards to the Email Policy, if an employee makes a posting about MPC to any group, it is it is required that the Email contains a disclaimer statement categorizing that the views are personal and do not present those of the MPC. When opening Emails, acceptable use requires that employees open attachments cautiously, especially if the source is doubtful to avoid opening malware (SANS Institute, 2014). As provided in the Email Policy, it is insupportable to send junk emails to random individuals who have not requested information. All kinds of harassments via Email represent unacceptable behavior. It is intolerable to utilize unsolicited emails that originate from the organizations network system with the aim of advertising services hosted by MPC.
It is unacceptable to engage in duplication of information covered under the Copyright Policy. For instance, it is unacceptable to distribute information from copyrighted books and leaflets. The user must have the license to use such information. Hence, the acceptable practice involves complying with copyright and intellectual property laws. It is improper to acquire organizational data if the purpose is not to the interest of the company (Haferkamp, 2014). Also, it offensive to export software that are against the international control standards. It is acceptable to consult the administration before exportation of such materials. It is objectionable for employees to engage in the trading of copyrighted materials or sharing of pirated materials. Moreover, it is unacceptable to violate any intellectual laws in the process of blogging activities.
Computer, Email and Internet Usage. (2014). Retrieved October 13, 2016, from https://www.shrm.org/resourcesandtools/tools-and-samples/policies/pages/cms_006400.aspxDoherty, N. F., Anastasakis, L., & Fulford, H. (2011). Reinforcing the security of corporate information resources: A critical review of the role of the acceptable use policy. International journal of information management, 31(3), 201-209.
Haferkamp, R. (2014). How to Write the Acceptable Use Policy your Business Needs. Retrieved October 13, 2016, from https://www.cnbwaco.com/blog/how-to-write-the-acceptable-use-policy-your-business-needs/
SANS Institute. (2014). Acceptable Use Policy. Retrieved October 13, 2016, from https://www.sans.org/security-resources/policies/general/pdf/acceptable-use-policy
Cite this page
Acceptable Use Policy. (2019, Nov 18). Retrieved from https://speedypaper.com/essays/acceptable-use-policy
If you are the original author of this essay and no longer wish to have it published on the SpeedyPaper website, please click below to request its removal:
- Writing Analytical
- Importance of Sports for Teenagers
- Internal Auditing functions
- Casual Apparel in Workplace
- Behavior finance
- Stuttering Therapy for Children
- UAVs and computer politics
- Competition in the Healthcare Market
- Egyptian uprising
- Video Game Addiction
- Extent to which study design reduce threats to internal, construct, and external validity
- Deaf Events
- Why should we eat local food?
- THE VIKINGS TRADE IMPACT IN AMERICA
- Improving Housing Quality on First Nations reserves in Saskatchewan Canada