Академический Документы
Профессиональный Документы
Культура Документы
1.0 Overview
The systems of this organization are for business purposes only. Effective security of
these systems is critical in order to prevent damage or harm to the systems or personnel.
2.0 Purpose
The purpose of this policy is to outline the acceptable use of the equipment belonging to
to this organization.
3.0 Scope
\The policy applies to all employees, contractors or visitors with system or network access and all
equipment belonging to the organization.
4.0 Policy
4.1 General Use
4.1.1. Users should be aware that any and all data created on any of the systems
belonging to this organization will remain the property of the organization. The
confidentiality of any information on the network cannot be guaranteed.
4.1.2. All users should use their best judgement regarding the proper use of any
computer system. If an action is deemed questionable it should be brought to the
attention of a supervisor.
4.1.3. For the safety and security of the organization any monitoring will be done only
by users authorized by the organization.
4.4.2. E-Mail
1. Sending any unsolicited email that can be considered SPAM.
2. Forging email header information.
3. Sending forwarding emails for chain letters or anything similar in nature.
5.0 Enforcement
Any violators if this policy may be subject to disciplinary action up to and including
termination.