Monday, May 27, 2019

Acceptable Use Policy (AUP) Definition Essay

E-mailAll messages composed, displace, received, or stored on the e-mail scheme are and ride out the property of the guild. They are non the private property of the employee. Personal e-mail accounts are not to be used on the ships compeverys data processor system. The e-mail system is not to be used to send offensive, sexually suggestive, obscene, lewd, demeaning, or disruptive messages. This includes, but is not limited to, messages that are inconsistent with the companys policies on cost employment opportunity, anti-discrimination, and anti-harassment (including sexual harassment). Moreover, the e-mail system is not to be used to solicit or proselytize for commercial ventures, religious or political causes, or other non job-related solicitations.The Company reserves and intends to exercise the right to review, audit, intercept, access, disclose, and use all messages created, received, or sent over its e-mail system for any purpose. The contents of e-mail may be disclosed and used by the company to protect its rights and/or property without the permission of the employee, in the companys discretion. The confidentiality of any message should not be assumed. Even when a message is erased, it is still possible to retrieve and read that message. Further, passwords for security do not guarantee confidentiality. All passwords must be disclosed to the company or they are invalid and cannot be used.Employees not involved in maintenance or operation of the companys e-mail system are not authorized to retrieve or read any e-mail not sent to them. some(prenominal) exception to this policy requires the approval by senior management of the company. meshThe companys calculating machine network, including its connection to the Internet, is to be used for business-related purposes. Any unauthorized use of the Internet is strictly prohibited. Unauthorized use includes, but is not limited to, connecting, posting, or downloading pornographic material engaging in com puter hacking and other related activities attempting to disable or compromise the security of information contained on the companys computers or otherwise using the companys computers in a manner which interferes with their business purpose. Employees should not send highly confidential information through with(predicate) the Internet without encryption.Anythingsent through the Internet passes through a number of different computer systems, all with different levels of security. The confidentiality of messages may be compromised at any point along the way. Because postings placed on the Internet may display the companys address, make certain before posting information on the Internet that the information reflects the standards and policies of the company. Under no caboodle should information of a confidential, sensitive, or otherwise proprietary nature be placed on the Internet.Information posted or viewed on the Internet may constitute published material. Therefore, reproduction of information posted or otherwise available over the Internet may be done only by express permission of the author. Offensive, sexually suggestive, obscene, lewd, demeaning, or disruptive messages are prohibited. This includes, but is not limited to, messages that are inconsistent with the companys policies on equal employment opportunity, anti-discrimination, and anti-harassment (including sexual harassment). Use of the companys e-mail/Internet system from a personal or company-owned computer through company-owned connections are consequence to the same policies that apply to use from within company facilities. computersDue to the sensitive nature of computers and the software contained therein, all employees provided with computers may not download, install, alter, or delete any software, programs, and information (i.e., e-mails, spread sheets, databases, Microsoft Word, or other word processing documents) contained on company computers without the express authorization of the company. The company reserves the right to inspect or review its computers and the information contained therein at any time without notice or consent.Any employee who violates the companys e-mail/Internet/computer wont policy shall be subject to discipline, up to and including employment termination.ReferenceInternet Acceptable Usage Policy Guidelines . OSA. http//www.osa.state.ms.us/downloads/iupg.pdf (accessed April 17, 2014). Table of Contents. 9781449692438.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.