This acceptable use policy (AUP) can be found in the User Domain and is what is used to define what users are allowed and not allowed to do with Organization owned IT assets. It is designed to protect Richman, its employees, customers and partners from harm caused by misuse of LAN to WAN, internet and web surfing. Misuse includes anything that is deliberate as well as inadvertent actions (Kim & Solomon, 2014). Everyone that works for Richman is responsible for the security of our system and the data that is on it. As such, it is the responsibility of all employees to ensure that they adhere to the guidelines in this policy at all times. If for any reason, the employee feels that a portion of the policy is unclear …show more content…
Definitions
“Users” is classified as everyone who has immediate access to any of Richman’s IT systems. Included in this description would be permanent employees, temporary employees, customers, contractors and business partners (Example Acceptable Use Policy for IT Systems, 2016).
“Systems” refers to all IT equipment that directly connects to our corporate network and all equipment that has access corporate applications. This includes, but is not limited to, desktop computers, laptops, smartphones, tablets, printers, data and voice networks, networked devices, software, electronically-stored data, portable data storage devices, third party networking services, telephone handsets, video conferencing systems, and all other similar items commonly understood to be covered by this term (Example Acceptable Use Policy for IT Systems, 2016).
3. Scope
This Policy is universal and applies to all Users and Systems. In certain instances, some Users or Systems are geared to more specific policies that are affixed to certain areas where conflict may arise (Example Acceptable Use Policy for IT Systems, …show more content…
The confidentiality of information In the system cannot be guaranteed except for the areas that are required by law.
The IT Systems of Richman serve the sole purpose of supporting and enabling the organization business practices. A small amount of personal use is allowed, as long as they conform to proper use guidelines. Personal use cannot be detrimental to the users’ productivity or the productivity of their colleagues. Also, the personal use of the system must not cause Richmond to take on any costs which are not trivial in size. (Example Acceptable Use Policy for IT Systems, 2016).
Richman trusts that its employees will be fair and sensible when judging what constitutes an acceptable level of personal use of the company’s IT systems. If employees are uncertain they should consult their manager.
Any and all information that is on the system which may be sensitive in nature, must be encrypted and stored securely so there is no unauthorized access to the information. The accomplishment of this should be done in a way that does not prevent authorized users from being able to access the information. (Example Acceptable Use Policy for IT Systems,