Acceptable Use Policy & Security Audit - Essay Example

Comments (0) Cite this document
All the daily users of computer and network, are expected to adhere and obey the use secrecy and others rights. This should not be violated in any circumstances. The…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.8% of users find it useful
Acceptable Use Policy & Security Audit
Read TextPreview

Extract of sample "Acceptable Use Policy & Security Audit"

Acceptable use policy and general objective For a fair, acceptable and responsible use of IT, there should be a lot of secrecy and individual privileges. All the daily users of computer and network, are expected to adhere and obey the use secrecy and others rights. This should not be violated in any circumstances. The files, data and programs of others should be used without their consent. People using the various networks and computer systems should not intimidate, insult, deform and threaten other users is not permitted. This might lead to disciplinary action through legal suits.
Users have the right to protect their accounts. By ensuring there password to their different user name are well guarded from access. Also obtaining other vital information is illegal and greatly obstructed. This may results in termination of the network or service being used. It serves as a way protect to privacy to personal information. This ensures information is only accessed by the original and not pirated users.
The scope is to facilitate smooth, easy, and effective and joyful use of the networks and systems, the policies and rules cover the entire user using the facility. This include both hardware’s and software, connection and licensed using the network, also these rule, plans and regulations applies to various individuals and companies connected to the system
The policy of the system should only be altered by the owner or management team assigned. He is the one responsible of creating new interfaces, colour, size and designing of the network. The policy majorly, helps in protecting and guiding users from violating company obligation and rules (Laver 78). Also users feel their privacy is greatly and well protected.
Al the users should adhere to companies rules and regulation. Failure to which, their service will be terminated and removed from the network. Abusive and harassing others is prohibited and might lead to suits in law courts. They should also report abusive languages and any general views on how to improve service delivery (Laver 23).
Works Cited
Laver, F. J. M. An Introduction to the Uses of Computers. New York: CUP Archive, 2014. Read More
Cite this document
  • APA
  • MLA
(“Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 words. Retrieved from
(Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 Words)
Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 Words.
“Acceptable Use Policy & Security Audit Essay Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Acceptable Use Policy & Security Audit

Information Security Audit And Assurance

...). Fundamentals of error-correcting codes. Cambridge: Cambridge University Press. MSDN. (2012, March 20). Regulatory Compliance Demystified: An Introduction to Compliance for Developers. Retrieved November 23, 2012, from MSDN: Rainer, R. K., & Casey, G. C. (2011). Introduction to information systems. New Jersey: Wiley and sons. Richard, A. G., & Lawless, M. W. (1994). Technology and strategy: conceptual models and diagnostics. . us: Oxford University Press. Richard, E. C. (2007). Auditor's Guide to Information Systems Auditing. New Jersey: Wiley. Ruskwig. (2012). Security Policy. Retrieved November 22,...
13 Pages(3250 words)Essay

Financing Options for Larger Purchases

4 Pages(1000 words)Essay

Acceptable Use and Behavior Policy

...without affecting the productivity. This paper discusses the physical security policy, vulnerabilities, audit policy, log management, system administrator policies as well as the various security incident handling procedures at Firion Company. Physical security policy item Firion has implemented a number of physical security policies that are primarily aimed at improving the integrity and confidentiality of the information systems that are used in the company. One of the physical security policies that is the prohibition...
3 Pages(750 words)Essay

Corporate Acceptable Use Policy

The paper intends to discuss the purpose of the Acceptable Use Policy (AUP) developed by AT&T for its employees. The Purpose of an Acceptable Use Policy An Acceptable Use Policy is a collection of particular rules and policies which are implemented by the network and websites managers in order to enact certain restrictions regarding the utilization of available websites and networks. Most of the times, AT&T is found to be committed to obeying the government rules and regulations regarding the utilization of online sources, e-mail transmission and text messaging. The company always focuses on protecting the AT&T’s network and its online sources without getting interferences from the hands of the other users. In or...
5 Pages(1250 words)Case Study

Security Audit

...? Security Audit: Lafleur Trading Company Introduction Lafleur Trading Company is a multinational concern based in Canada, dealing in wholesale of food items. As part of overall task, a security audit was conducted in respect of information systems incorporated at this organization. Security audit refers to assessment of effectiveness of information systems and internal controls implemented by the company’s management. Several ethical issues are also faced during security audits such as role ambiguity existed between our team members during audit work causing conflicts and violation of hierarchy lines at times. Also, some team members violated integrity and confidentiality assertions by disclosing information to external parties... . This...
3 Pages(750 words)Essay

Margaret Fuller

6 Pages(1500 words)Essay

Adolescent therapy for parent-adolescent crises regarding personal freedom

13 Pages(3250 words)Essay

Company Policy on Acceptable Use of Email and Text Messaging

... Company Policy on Acceptable Use of Email and Text Messaging Receive our warm greetings. This is a reminder about components of the company’s policy on acceptable use of email and text messaging. It emphasizes the components of security, privacy and company monitoring of messages. The memo shall also consider other policies that connect with the aforementioned policy. These policies regard appropriate message content, consequences for using company equipment to send harassing messages and use of company system for sending personal email messages. You are reminded that the policy discourages employees from intentionally causing any security breach to the company’s and any other networks. Always recall that the policy’s provision... that...
1 Pages(250 words)Assignment

Acceptable Use Policy & Security Audit

...Acceptable Use Policy & Security Audit Acceptable Use Policy (AUP) refers to rules which are set by a manager of a given network or service which restricts access in which the system is used. AUP form an integral part of information security policies (Harriett 37). New members are supposed to sign this policy before giving them access to information systems. AUP are supposed to be clear and cover so many points in regard to users, what and not they are allowed to do in regard to the IT systems. In case it is not detailed, it should...
2 Pages(500 words)Essay

Acceptable Use Policy & Security Audit Acceptable Use Policy & Security Audit Part I: Acceptable Use Policy (AUP) The Acceptable Use Policy (AUP) policy usually applied to those persons intending to use IT resources owned by an entity. Computer resources herein applies to hardware and software, smart phones, PDAs, data network, and stored data among others. Notably, only the owner of internet resource data (so known by the federal law) can change the policies governing the accessibility of IT resources governed by the...
2 Pages(500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Acceptable Use Policy & Security Audit for FREE!

Contact Us