logo

Development of Acceptable Use Policy

6 Pages1472 Words95 Views
   

Added on  2023-01-17

About This Document

This article discusses the development and implementation of an Acceptable Use Policy (AUP) for network access in organizations. It explains the importance of setting boundaries and accountability for internet use, and provides a list of key policies that should be included in an AUP.

Development of Acceptable Use Policy

   Added on 2023-01-17

ShareRelated Documents
Running head: INFORMATION ASSURANCE RISK AND COMPLIANCE
INFORMATION ASSURANCE RISK AND COMPLIANCE
Name of the Student
Name of the Organization
Author Note
Development of Acceptable Use Policy_1
1INFORMATION ASSURANCE RISK AND COMPLIANCE
Development of Acceptable Use Policy
An acceptable use policy or AUP is a particular document which is used to stipulate all
the practices which any user should agree for getting access to any network of any corporate
sector. Several facilities of business as well as educational organizations need that every
employees or students must sign an acceptable use policy (AUP) before being granted an ID of
the network (McMenemy, 2014). AUP can also be defined as a usage policy which is acceptable
comprising of a set of rules and regulations by the creator or rather the administrator of a
particular network or service.
Whenever an Internet service Provider of ISP is signed up, it has been noticed that an
AUP will be provided which will clearly several policies and stipulations which are needed to be
followed by all the members of that particular network (Isaacs et al., 2014). An Acceptable Use
policy is mainly implemented within any organizations by giving all the staffs with a set of two
copies. There will be a signed copy which will remain on the file (Gallagher, McMenemy &
Poulter, 2015). An appropriate and a clear Acceptable Use Policy will be capable of setting a
boundary of the use of the internet and keeps all the staffs accountable for that. Several strict
actions may be taken if there is even a slight deviation from the policy which will be developed
for a particular organization (Shepherd & Mejias, 2016). The main purpose of this policy will
define what type of actions the users will perform for accessing systems and the equipment of
networking.
The main Acceptable Use Policies which are developed are listed below:
Development of Acceptable Use Policy_2
2INFORMATION ASSURANCE RISK AND COMPLIANCE
All kinds of proprietary data and information which are stored on several devices of
computing or networks whether owned or rather leased by any particular authority,
authorised member or a third party, must remain the sole property of that authority.
Reservation of the rights for auditing networks as well as systems on a basis which will be
periodic for ensuring compliance with the policy.
All computing systems which are connected to the network internally should comply with
that of the Minimum Access Policy.
The level of system and the password of the user level should comply with the policy of
password. Providing with the access to some other user, either mistakenly or deliberately for
securing the access, is totally prohibited.
There is a strict prohibition in copying all the copyrighted materials which are unauthorised.
Exporting information which are technical, software of encryption or any other software
present in the control laws of export is totally illegal.
Sharing of the password of the account to other people or allowing the utilisation of the
account by others is strictly prohibited.
Specially, for the purposes of maintenance of security as well as network, all the individuals
which are not authorised may monitor systems and the traffic of network at any time
whenever they want as per the Policy of Audit.
All the authorized users should utilise an extreme caution while opening all the attachments
of e-mail which are mostly received form all the senders who are totally unknown. They may
contain a lot of malware.
Development of Acceptable Use Policy_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Acceptable Use Policies: Guidelines for Proper Usage of IT Systems
|4
|776
|402

Computer Security
|14
|3128
|42

Information Security Management- Assignment
|8
|1556
|188

Information Assurance Policy for Elite Bet Gambling Company
|11
|1914
|491

IT Security: Protective Measures, Information Security Policy, Protecting Information in Computer System, Business Use 2-key Triple DES
|8
|1360
|274

Information Security Awareness Training | PPT
|20
|1073
|57