Haven't found the Essay You Want?
For Only $12.90/page

Acceptable Use Policy (AUP) Definition Essay

All messages composed, sent, received, or stored on the e-mail system are and remain the property of the company. They are not the private property of the employee. Personal e-mail accounts are not to be used on the company’s computer system. The e-mail system is not to be used to send offensive, sexually suggestive, obscene, lewd, demeaning, or disruptive messages. This includes, but is not limited to, messages that are inconsistent with the company’s policies on equal employment opportunity, anti-discrimination, and anti-harassment (including sexual harassment). Moreover, the e-mail system is not to be used to solicit or proselytize for commercial ventures, religious or political causes, or other non job-related solicitations.

The Company reserves and intends to exercise the right to review, audit, intercept, access, disclose, and use all messages created, received, or sent over its e-mail system for any purpose. The contents of e-mail may be disclosed and used by the company to protect its rights and/or property without the permission of the employee, in the company’s discretion. The confidentiality of any message should not be assumed. Even when a message is erased, it is still possible to retrieve and read that message. Further, passwords for security do not guarantee confidentiality. All passwords must be disclosed to the company or they are invalid and cannot be used.

Employees not involved in maintenance or operation of the company’s e-mail system are not authorized to retrieve or read any e-mail not sent to them. Any exception to this policy requires the approval by senior management of the company. Internet

The company’s computer network, including its connection to the Internet, is to be used for business-related purposes. Any unauthorized use of the Internet is strictly prohibited. Unauthorized use includes, but is not limited to, connecting, posting, or downloading pornographic material; engaging in computer “hacking” and other related activities; attempting to disable or compromise the security of information contained on the company’s computers; or otherwise using the company’s computers in a manner which interferes with their business purpose. Employees should not send highly confidential information through the Internet without encryption.

Anything sent through the Internet passes through a number of different computer systems, all with different levels of security. The confidentiality of messages may be compromised at any point along the way. Because postings placed on the Internet may display the company’s address, make certain before posting information on the Internet that the information reflects the standards and policies of the company. Under no circumstances should information of a confidential, sensitive, or otherwise proprietary nature be placed on the Internet.

Information posted or viewed on the Internet may constitute published material. Therefore, reproduction of information posted or otherwise available over the Internet may be done only by express permission of the author. Offensive, sexually suggestive, obscene, lewd, demeaning, or disruptive messages are prohibited. This includes, but is not limited to, messages that are inconsistent with the company’s policies on equal employment opportunity, anti-discrimination, and anti-harassment (including sexual harassment). Use of the company’s e-mail/Internet system from a personal or company-owned computer through company-owned connections are subject to the same policies that apply to use from within company facilities. computers

Due to the sensitive nature of computers and the software contained therein, all employees provided with computers may not download, install, alter, or delete any software, programs, and information (i.e., e-mails, spread sheets, databases, Microsoft Word, or other word processing documents) contained on company computers without the express authorization of the company. The company reserves the right to inspect or review its computers and the information contained therein at any time without notice or consent.

Any employee who violates the company’s e-mail/Internet/computer usage policy shall be subject to discipline, up to and including employment termination.

“Internet Acceptable Usage Policy Guidelines .” OSA. http://www.osa.state.ms.us/downloads/iupg.pdf (accessed April 17, 2014). “Table of Contents.” 9781449692438.

Essay Topics:

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email. Please, specify your valid email address

We can't stand spam as much as you do No, thanks. I prefer suffering on my own