StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Acceptable Use Policy & Security Audit - Essay Example

Cite this document
Summary
All the daily users of computer and network, are expected to adhere and obey the use secrecy and others rights. This should not be violated in any circumstances. The…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.5% of users find it useful
Acceptable Use Policy & Security Audit
Read Text Preview

Extract of sample "Acceptable Use Policy & Security Audit"

Acceptable use policy and general objective For a fair, acceptable and responsible use of IT, there should be a lot of secrecy and individual privileges. All the daily users of computer and network, are expected to adhere and obey the use secrecy and others rights. This should not be violated in any circumstances. The files, data and programs of others should be used without their consent. People using the various networks and computer systems should not intimidate, insult, deform and threaten other users is not permitted.

This might lead to disciplinary action through legal suits.Users have the right to protect their accounts. By ensuring there password to their different user name are well guarded from access. Also obtaining other vital information is illegal and greatly obstructed. This may results in termination of the network or service being used. It serves as a way protect to privacy to personal information. This ensures information is only accessed by the original and not pirated users.The scope is to facilitate smooth, easy, and effective and joyful use of the networks and systems, the policies and rules cover the entire user using the facility.

This include both hardware’s and software, connection and licensed using the network, also these rule, plans and regulations applies to various individuals and companies connected to the systemThe policy of the system should only be altered by the owner or management team assigned. He is the one responsible of creating new interfaces, colour, size and designing of the network. The policy majorly, helps in protecting and guiding users from violating company obligation and rules (Laver 78). Also users feel their privacy is greatly and well protected.

Al the users should adhere to companies rules and regulation. Failure to which, their service will be terminated and removed from the network. Abusive and harassing others is prohibited and might lead to suits in law courts. They should also report abusive languages and any general views on how to improve service delivery (Laver 23).Works CitedLaver, F. J. M. An Introduction to the Uses of Computers. New York: CUP Archive, 2014.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1670939-acceptable-use-policy-security-audit
(Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 Words)
Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1670939-acceptable-use-policy-security-audit.
“Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1670939-acceptable-use-policy-security-audit.
  • Cited: 0 times

CHECK THESE SAMPLES OF Acceptable Use Policy & Security Audit

Acceptable Use and Behavior Policy

To protect confidential information and its financial interests, the company has adopted a number of acceptable use and behavior policies that not only enable it to mitigate the threats but also allow the employees to flexibly conduct their daily businesses without affecting the productivity.... The audit policy item employed by Firion Corporation is primarily designed to guide the security team to audit the company's infrastructure system and mitigate the potential vulnerabilities....
3 Pages (750 words) Essay

The Effective Manager

In order to evaluate the statement that how does the understanding of accounting and financial management contribute to effective security management, one has to learn the whole process and implications of effective security managements and its linkages to the accounting and financial knowledge.... hellip; security policies are the foundation of the effective security management.... Without them, one cannot protect the company from possible lawsuits, lost revenue, and bad publicity, not to mention basic security attacks....
9 Pages (2250 words) Assignment

Computer Glossary - Internal and External LAN

Without dedicated networks to clients, and because there would be unacceptable security risks in managing client VPN access to the office LAN, it has been proposed that all networked services outside the office LAN will be managed on a separate machine running a Linux (or Ix) OS.... Therefore, certain measures must be taken in order to ensure data security.... Firewall technology is one feature of database security.... use the Universal Group model....
13 Pages (3250 words) Essay

Issues in Information Assurance Policy

But the most important among its functions concern the treats to security which could come from many different areas including – but not limited to – intentional attacks and also from unintended acts that result from technical, organizational and individual mistakes.... It is natural and necessary for organizations to act in its best An Information Assurance (IA) policy is one of the mechanisms that an organization could use in order to achieve this.... This paper will examine the issues in formulating such policy, including an overview of what IA is, the threats it aims to address, the ethics of developing certain rules that concerns rights issues, among other related variables....
8 Pages (2000 words) Term Paper

Risk Management and Control Effectiveness

Management of information security is vital in every organization as it ensure security of information, systems infrastructure and data content being processed, accessed, managed and communicated to the public.... This paper answers seven questions in relation to effectiveness of… According to Oppliger (2003), management of information security in organizations is very vital as it ensures that the security of information is This paper answers seven questions in relation to effectiveness of security technologies and methodology, risks related to them, additional controls, and access of technology within organizations....
6 Pages (1500 words) Essay

Enterprise Security Policy Plan for MEMATECH Solutions Limited

The paper "Enterprise security Policy Plan for MEMATECH Solutions Limited " states that MemaTech is required to embrace the security requirements of the policy in addition to federal law, contractual obligations, and state law where the IT resources and Information assets are subject.... hellip; The company is required to install, configure, implement, and test the discovery software for security provisions to reduce the effect to processes or systems from the impact of major failures of Information Technology Resources through the continuation of operations plan and plan for disaster recovery....
5 Pages (1250 words) Case Study

Network Architecture and Security Considerations in IISC

However, persistent violation of this policy requirement will be regarded as a violation of acceptable use policy and can attract disciplinary action that may include, but not limited to, a legal action.... However, users making use of the internet service shall be subject to terms and conditions stipulated in the acceptable use policy.... This term paper "Network Architecture and security Considerations in IISC" is aimed to analyze the security Administrator Handbook of the IISC....
15 Pages (3750 words) Term Paper

Audit and Control Security Technology

This case study "audit and Control Security Technology" analyzes audit and control security technology used in banks as well as the aspects attributed to the technology.... The document below analyzes audit and control security technology used in banks as well as the aspects attributed to the technology.... The audit and control technology, however, has been initiated by experts with the latest technology.... With an effective security technology, the banks are capable of withstanding the threats, keeping its systems safe....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us