How is an acceptable use policy typically used?

What will be an ideal response?


ANSWER: An AUP (acceptable use policy) explains to users what they can and cannot do while accessing a network's resources. It also explains penalties for violations, and might describe how these measures protect the network's security. Employers should never assume that employees inherently know what is acceptable use of company IT resources and what is not. Detailing this information clarifies expectations for everyone. Some of the restrictions might include the following:
* Don't do anything illegal.
* Don't try to circumvent network security restrictions.
* Don't market products or services to other network users.
* Don't forward spam e-mail.
* Don't violate the rights of any person or organization.
* Don't violate copyright, trade secret, patent, intellectual property, or other regulations.
* Don't export software, technical information, or encryption technology.
* Always sign off or lock a device when not in use.
* Use company resources to fulfill job obligations, and not for personal tasks.
* Be aware that activities on the network can be and are monitored and may be formally audited.
* Immediately report any suspected compromise of confidential data or customer privacy.

Computer Science & Information Technology

You might also like to view...

Which of the seven job functions is responsible for the support of customers?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Answer the following questions true (T) or false (F)

1. The modifier private means that an instance variable can be accessed by name outside of the class definition. 2. It is considered good programming practice to validate a value passed to a mutator method before setting the instance variable.

Computer Science & Information Technology

When you use the form tool to create a form, Access analyzes relationships between tables, and automatically adds a(n) ________, which displays records with foreign key values that match the primary key value in the main form

Fill in the blank(s) with correct word

Computer Science & Information Technology

Goal Seek differs from one and two-variable data table analysis by ________

A) providing a row of possibilities B) providing a single best answer rather than a table of possible answers C) building a data table automatically D) providing an average of the possibilities

Computer Science & Information Technology