: Employee IT Acceptable Use Policy /Analysis A . IntroductionThis s seeks to prep are an employee usage policy for one s organization s nurture systems and assets . The policy includes , but not necessarily be special toemail and web usage . The name of the organization is ABC grass see Appendix A for the basic of the organization with its care and visionB . The Employees Usage PolicyThe ABC jackpotInformation Systems Usage and Other Assets PolicyGeneral Use , electronic Mail , and cyberspace AccessI . INTRODUCTIONIt is the policy of the ABC Corporation (or hereafter c eithered Corporation ) to encourage the effective , efficient , and legal intent of all Corporation resources for the delivery of service to its members This includes the design of the Internet , internal and Internet e-mail personal computers and computer networks and link assets (Pierce 2001 . This policy establishes guidelines for the appropriate utilization of technology in a manner that is consistent with effective and efficient principles of handling keeping . This policy applies to all The Corporation employees and members using the Corporation provided computer resources described herein . The Information Technology Services part (ITS ) and Designated Heads of the various departments shall have the primary responsibility for monitoring and implementing these guidelinesII . computing device SYSTEMS1 . Permissible Usea . The Corporation shall ensure that computers , telephones , and new(prenominal) technology resources are assigned according to job function , and employees are liable for using them appropriately . Internet and e-mail access shall be provided to employees at the discretion of their Designated Headb . The Corporation s computers and related resources are provided and think to beused for The Corporation s business , hence incidental personal use of computer resources must be reasonable , and at no cost to the Corporationc . Users are prohibited from using the Corporation s computer resources for personal orprivate financial benefitd .
User privacy does not give way to the employee s work related conduct or the use of Corporation resources , and therefore , the Corporation maintains the right to monitor the use of all computing resources for the purpose of ensuring that all applicable policies and laws are universe followede . The Corporation prohibits the following activities1 . Inappropriate language including obscenity , tweediness , profanity or name-calling , expressions of ill will or diverge against individuals or group and transmission of offensive or sexually explicit material2 . Visiting pornographic , sexually explicit , or offensive Internet sites3 . Harassing substances , derogatory comments , retaliation or other discrimination4 . Use of aliases or anonymous messages or misrepresentations of position or authority5 . Hacking or cracking as well as well-educated intercepting , reading copying , or otherwise compromising of schooling to a non-authorized person or entity . Hacking or cracking is delimitate here as the practice of breaking into or electronegative someone else s computer system or network bypassing passwords or licenses in computer programs or in other slipway intentionally breaching computer security6 . Spamming - The practice of sending copies of a message to many different newsgroups or mailing lists , with no regard...If you deficiency to get a full essay, order it on our website:
Ordercustompaper.comIf you want to get a full essay, wisit our page:
write my paper
No comments:
Post a Comment