Wednesday, March 13, 2019
Acceptable Use Policy (AUP) Definition Essay
E-mailAll messages composed, sent, received, or stored on the email body are and remain the property of the comp whatsoever. They are not the privy property of the employee. Personal electronic mail accounts are not to be utilize on the companys computer system of rules. The e-mail system is not to be employ to send offensive, sexually suggestive, obscene, lewd, demeaning, or disruptive messages. This includes, yet is not restrain to, messages that are inconsistent with the companys policies on equal betrothal opportunity, anti-discrimination, and anti-harassment (including sexual harassment). Moreover, the e-mail system is not to be utilizationd to solicit or proselytize for commercial ventures, religious or political causes, or opposite non job-related solicitations.The Company reserves and intends to exercise the decline to review, audit, intercept, access, disclose, and use all messages created, received, or sent over its e-mail system for any purpose. The contents o f e-mail may be let on and used by the company to protect its arights and/or property without the leave of the employee, in the companys discretion. The confidentiality of any message should not be assumed. scour when a message is erased, it is still possible to retrieve and ingest that message. Further, passwords for guarantor do not guarantee confidentiality. All passwords must be disclosed to the company or they are invalid and cannot be used.Employees not tangled in maintenance or operation of the companys e-mail system are not authorized to retrieve or read any e-mail not sent to them. Any exception to this indemnity requires the approval by senior management of the company. meshworkThe companys computer network, including its connection to the profits, is to be used for business-related purposes. Any unauthorized use of the Internet is strictly prohibited. Unauthorized use includes, but is not control to, connecting, posting, or downloading pornographic material eng aging in computer hacking and other related activities attempting to disable or compromise the security of discipline contained on the companys computers or differently using the companys computers in a manner which interferes with their business purpose. Employees should not send exceedingly confidential information through the Internet without encryption.Anythingsent through the Internet passes through a number of divergent computer systems, all with different levels of security. The confidentiality of messages may be compromised at any point along the way. Because postings fixed on the Internet may display the companys address, slay certain before posting information on the Internet that the information reflects the standards and policies of the company. Under no circumstances should information of a confidential, naked as a jaybird, or otherwise proprietary nature be placed on the Internet.Information affix or viewed on the Internet may constitute published material. The refore, retort of information posted or otherwise available over the Internet may be done only by express permission of the author. Offensive, sexually suggestive, obscene, lewd, demeaning, or disruptive messages are prohibited. This includes, but is not limited to, messages that are inconsistent with the companys policies on equal employment opportunity, anti-discrimination, and anti-harassment (including sexual harassment). Use of the companys e-mail/Internet system from a personal or company-owned computer through company-owned connections are theater to the same policies that apply to use from within company facilities. computersDue to the sensitive nature of computers and the software contained therein, all employees provided with computers may not download, install, alter, or wipe out any software, programs, and information (i.e., e-mails, spread sheets, databases, Microsoft Word, or other word process documents) contained on company computers without the express authorizat ion of the company. The company reserves the right to inspect or review its computers and the information contained therein at any time without notice or consent.Any employee who violates the companys e-mail/Internet/computer usage policy shall be subject to discipline, up to and including employment termination.ReferenceInternet Acceptable Usage Policy Guidelines . OSA. http//www.osa.state.ms.us/downloads/iupg.pdf (accessed April 17, 2014). knock back of Contents. 9781449692438.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.