Understanding Acceptable Use Policies (AUPs) and Their Guidelines

Verified

Added on  2023/06/15

|4
|776
|402
Essay
AI Summary
This essay delves into the concept of Acceptable Use Policies (AUPs), which are rules established by website, network, or service administrators to restrict usage and provide guidelines for proper operation. AUPs are crucial for businesses, corporations, universities, and website owners to mitigate legal risks, serving as a vital component of information security frameworks. The essay emphasizes the importance of clarity and comprehensiveness in AUPs, ensuring they cover essential aspects of permissible and prohibited activities within an organization's IT systems, including password management, software licenses, and online etiquette. Furthermore, it highlights the role of AUPs in protecting younger users from inappropriate content in public organizations and their utility in monitoring employee behavior to identify cyber slackers or abusers, making them an integral part of an organization's security and compliance strategy. Desklib provides access to this essay and a wealth of other academic resources for students.
Document Page
Running head: MODULE 7
Module 7
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2MODULE 7
The blog aims at discussing Acceptable Use Policies or AUPs. The AUPs are
basically rules which the creator, owner and administrator of a website, network or service
applies for restricting the use of the same along with the mention of necessary guidelines for
their proper usage. The AUP documents are primarily written for business, corporations,
universities, internet service providers, schools and website owners for reducing the potential
of the legal action undertaken by the user.
The AUPs represents an essential part of the framework for the policies of
information security (Ugrin & Pearson, 2013). Therefore, it is a common norm of asking the
newer members of the organizations in signing the AUP before they are provided access to
the information systems. Hence, AUP must not only be clear and concise but also cover the
vital points regarding what the users are allowed or not allowed of doing with the information
technology (IT) systems of the organization. These policies must refer the users to a better
and comprehensive security wherever relevant (Moorefield-Lang, 2015). For instance, as per
AUP guidelines, certain organizations makes sure that while using someone else’s computer
it is vital to log off and make sure that the password and email Id is not saved. Such
organization also focuses on using an authorized shared computer for a cluster. These
organizations also make it vital to conduct any sort of video conferencing using one’s
personal system. In addition they only allow storage of audio files which are only obtained
legitimately for using in the language instruction. The AUP should also define the
consequences that would apply to the users if they break the norm. However, the regular
audits should measure the compliance of the policy.
AUP documents are somewhat similar to the Terms of Service that is visible on
software applications (Mughele, Ibitola & Okunoye, 2013). There however lies a thin line of
differences as AUPs not only deals with large computing resources for examples website or
LAN but they also focus on the respect and etiquette of the fellow users. AUP related to the
Document Page
3MODULE 7
computer security has to deal with great details including management of passwords,
software licenses and online intellectual property. They also deal with international etiquette
such as a brief description of the email policy of the firm or tackle excessive usage of the
system resources like management of the superfluous traffic as a result of playing games. The
AUPs documents seem helpful and handy in situations whenever new members join the
network or the information system. Thus, an AUP must not only be concise and clear but also
cover all the relevant points mentioning the permissible behaviour in using the IT system of a
company (Bachrach & Rzeszut, 2014). In public organizations like the universities or
libraries, AUPs must be used for protecting the younger generation from pornography,
profanity and bad influence.
AUPs also have a useful aspect as they are very much an integral part of the
monitoring process. They can be an effective tool in identification of cyber slackers and the
abusers amongst the employees within the organization. Monitoring the email service as well
as the internet is considered legal only if the employees mention the AUP to the employees.
Document Page
4MODULE 7
References:
Bachrach, D. G., & Rzeszut, E. J. (2014). Don’t Let the Snoops In. In 10 Don’ts on Your
Digital Devices (pp. 57-76). Apress, Berkeley, CA.
Moorefield-Lang, H. M. (2015). User agreements and makerspaces: a content analysis. New
Library World, 116(7/8), 358-368.
Mughele, E. S., Ibitola, A., & Okunoye, A. (2013). Enforcing Security On Cloud Computing
Network: A Theoretical Frame Work. Computing, Information Systems & Development
Informatics, 4(1), 64-72.
Ugrin, J. C., & Pearson, J. M. (2013). The effects of sanctions and stigmas on
cyberloafing. Computers in Human Behavior, 29(3), 812-820.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]