logo

Computer Use Policy

6 Pages1089 Words284 Views
   

Added on  2020-05-16

About This Document

COMPUTER USE POLICY 4 4 COMPUTER USE POLICY Computer Use Policy Author note: Introduction In order to make the fullest out of the technological allowences of an organization, it is necessary to layout certain basic ground rules for the uses of the same. The Computer Use Policy is one such important set of rules that guides and organization, it employees and the clients on the right path to use the technological modules of or within the organization. Flint (2014), says that computers and the internet can be used for more than

Computer Use Policy

   Added on 2020-05-16

ShareRelated Documents
Running head: COMPUTER USE POLICY
Computer Use Policy
Name of the Student:
Name of the University:
Author note:
Computer Use Policy_1
1
COMPUTER USE POLICY
Introduction
In order to make the fullest out of the technological allowences of an organization, it is
necessary to layout certain basic ground rules for the uses of the same. The Computer Use Policy
is one such important set of rules that guides and organization, it employees and the clients on
the right path to use the technological modules of or within the organization. In this study,
Deloitte’s IT strategic plan shall be extended further in order to add the computer usage policies.
Computer Use Policy Plan
The purpose of this plan is quite clear. Flint (2014), says that computers and the internet
can be used for more than just on purpose as the web is growing every hour. It is therefore
necessary to set a boundary on the allowance of computer usage within the organization.
Researchers state that the computers, since the advent of the internet and the ease of access, have
been used to fulfill numerous tasks that were not related to the working environments of the
respective organizations. It is necessary for organizations to tailor their IT or computer usage
policies to govern their employees to use workplace systems only to suit work-based
circumstances. For a consultancy farm like Deloitte, it is more than just the need of the hour to
define these clauses for computer fair usage. The necessary aspects that the policy plan must
define are as follows:
1. Rights and Responsibilities
Computers and internetworks can give its users the access to resources that are both on
and off campus and allow them to communicate with the rest of the world as well. Such open
access privileges requires a responsible approach from the users. It is necessary for the users to
not misuse the medium and in turn respect the rights of other individuals and the integrity of the
Computer Use Policy_2
2
COMPUTER USE POLICY
organizational resources and rules that they abide by. The employees of the Deloitte should be
given their right to access personal information and browse through the federal laws and
corresponding state laws or policies (Murray, 2013).
2. Acceptable Use Policy
The company provides the employees with the privilege to use computers and the internet
as a corresponding part of their work. However, the users or employees are expected to use these
resources only for office works. Conducting researches on the internet that shall suffice to the
betterment of the organization shall be acceptable under the fair use policy as well. It is also
expected that the respective users can handle the mail-based conversations with maturity to
uphold the company’s standards and abide by the internet netiquettes. However, the allowance of
personal devices shall be limited and verified under company guidelines (Harris, Ives & Junglas,
2012).
3. Examples of misuse
Certain examples of misuse of computer and other technical resources within the
organization are as follows:
Users often try to gain unauthorized access of information or system resources.
Using social media or playing games on the organization provided computers (Graybiel
& Smith, 2014).
Downloading and installing software products without the consent of the administrator.
Employees often try to smuggle out confidential data and other digital products from the
workplaces through mails or personal devices (Miller, Voas & Hurlburt, 2012).
Computer Use Policy_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
GREEN BRANCH COFFEE POLICY
|3
|581
|17

Assignment on Foundation of Computer Security
|9
|2007
|18

Advanced Network Security
|6
|1027
|376

System Administration: Computer Usage and Restrictions Policy
|6
|912
|426

IT Risk Management
|7
|1140
|279

ICTICT418: Contribute to Copyright, Ethics and Privacy- ICT Environment
|6
|1843
|310