Computer Use Policy for Deloitte: A Strategic Report

Verified

Added on  2020/05/16

|6
|1089
|284
Report
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: COMPUTER USE POLICY
Computer Use Policy
Name of the Student:
Name of the University:
Author note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
COMPUTER USE POLICY
Introduction
In order to make the fullest out of the technological allowences of an organization, it is
necessary to layout certain basic ground rules for the uses of the same. The Computer Use Policy
is one such important set of rules that guides and organization, it employees and the clients on
the right path to use the technological modules of or within the organization. In this study,
Deloitte’s IT strategic plan shall be extended further in order to add the computer usage policies.
Computer Use Policy Plan
The purpose of this plan is quite clear. Flint (2014), says that computers and the internet
can be used for more than just on purpose as the web is growing every hour. It is therefore
necessary to set a boundary on the allowance of computer usage within the organization.
Researchers state that the computers, since the advent of the internet and the ease of access, have
been used to fulfill numerous tasks that were not related to the working environments of the
respective organizations. It is necessary for organizations to tailor their IT or computer usage
policies to govern their employees to use workplace systems only to suit work-based
circumstances. For a consultancy farm like Deloitte, it is more than just the need of the hour to
define these clauses for computer fair usage. The necessary aspects that the policy plan must
define are as follows:
1. Rights and Responsibilities
Computers and internetworks can give its users the access to resources that are both on
and off campus and allow them to communicate with the rest of the world as well. Such open
access privileges requires a responsible approach from the users. It is necessary for the users to
not misuse the medium and in turn respect the rights of other individuals and the integrity of the
Document Page
2
COMPUTER USE POLICY
organizational resources and rules that they abide by. The employees of the Deloitte should be
given their right to access personal information and browse through the federal laws and
corresponding state laws or policies (Murray, 2013).
2. Acceptable Use Policy
The company provides the employees with the privilege to use computers and the internet
as a corresponding part of their work. However, the users or employees are expected to use these
resources only for office works. Conducting researches on the internet that shall suffice to the
betterment of the organization shall be acceptable under the fair use policy as well. It is also
expected that the respective users can handle the mail-based conversations with maturity to
uphold the company’s standards and abide by the internet netiquettes. However, the allowance of
personal devices shall be limited and verified under company guidelines (Harris, Ives & Junglas,
2012).
3. Examples of misuse
Certain examples of misuse of computer and other technical resources within the
organization are as follows:
Users often try to gain unauthorized access of information or system resources.
Using social media or playing games on the organization provided computers (Graybiel
& Smith, 2014).
Downloading and installing software products without the consent of the administrator.
Employees often try to smuggle out confidential data and other digital products from the
workplaces through mails or personal devices (Miller, Voas & Hurlburt, 2012).
Document Page
3
COMPUTER USE POLICY
Employees who are in charge of the web handles of the organization often posts
information that are not validated or worthy enough to level the company’s status and
prestige.
Using the office computers to commit personal business tasks.
4. Enforcement
Deloitte must ensure that the computer use plan has a well-described policy enforcement
section. Penalties may be enforced on the personnel who shall be charged of misconduct or
misusing the organizational computer and internet resources. These penalties may be according
to the federal laws or the preset organizational policies. Employees, who will be found guilty but
have adequate justifications for their deed may still be charged with minor punishments and
warned through e-mails.
5. Reporting Misuse
Any misuse of computer and other technical resources must be reported to the respective
team supervisors or the Human Resource Manager or staffs. Further, the employees can also
lodge complaint on the official mail ids of the above-mentioned stakeholders.
6. Spread Awareness
There must be amendments in the system to make sure that every employee within the
organization is aware of the computer usage policies and other IT related laws and information.
This can be achieved through personal email notifications or training and induction sessions.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
COMPUTER USE POLICY
Conclusion
The above report helps to identify the needs of a detailed computer usage policy for any
organization. The Deloitte, being a consultancy farm, that deals with IT infrastructure and
services, to have all of this planned is an utmost necessity. The employees and employers, all
must recognize the policies integrated to the fair usage of computers and must abide by them.
This will help the organization to succeed in terms of work culture and hence enhance
productivity.
Document Page
5
COMPUTER USE POLICY
References
Computer Use Policy | Information Security and Policy. (2018). Security.berkeley.edu. Retrieved
24 January 2018, from https://security.berkeley.edu/computer-use-policy
Flint, D. (2014). Computers and Internet. Business Law Review, 35(3), 108-109.
Graybiel, A. M., & Smith, K. S. (2014). Good habits, bad habits. Scientific American, 310(6),
38-43.
Harris, J., Ives, B., & Junglas, I. (2012). IT Consumerization: When Gadgets Turn Into
Enterprise IT Tools. MIS Quarterly Executive, 11(3).
Miller, K. W., Voas, J., & Hurlburt, G. F. (2012). BYOD: Security and privacy considerations. It
Professional, 14(5), 53-55.
Murray, A. (2013). Information technology law: the law and society. Oxford University Press.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]