What is an Acceptable Use Policy? Acceptable Use Policy (AUP) Code of Conduct for Internet Use Used by Organizations and Businesses Outlines agreement in writing Document signed by employee/participant and the governing organization or business What’s Included in Policy? Identifies owner of computers/network Defines intended use Identifies unacceptable use Notes consequences Requires signature of acceptance Why Have a Policy? Protect the company or organization Protect the employee (or computer user) Maintains security Laws Governing Internet Use Copyright laws Child protection laws Privacy rights and safety National security Laws continue to evolve and change! Unacceptable Behavior Visiting sites that contain obscene, hateful or otherwise illegal material Using the computer to perpetrate any form of fraud or music piracy Using the Internet to send offensive or harassing material to other users Hacking into unauthorized areas Publishing defamatory and/or knowingly false material about your company, colleagues and/or customers on social networking sites, blogs Unacceptable Behavior Revealing confidential information about your company in a personal online posting, upload or transmission (financial information or information relating to customers, business plans, policies, staff and/or internal discussions) Undertaking deliberate activities that waste staff effort or networked resources Introducing any form of malicious software into the corporate network AUP Consequences Chevron Corp. settled out of court—paying US $2.2 million—after the company was sued because of an e-mail circulated within the company containing offensive material. Microsoft Corp. settled for US $2.2 million a sexual harassment suit involving inappropriate e-mails sent within the company. http://www.isaca.org/Journal/archives/2005/Volume-6/Pages/Best-Practices-for-Establishing-an-EffectiveWorkplace-Policy-for-Acceptable-Computer-Usage1.aspx AUP Consequences Xerox fired more than 40 employees for downloading inappropriate images. These downloads choked Xerox's computer system and prevented employees from sending and receiving legitimate e-mails. Wachovia Securities fired six brokers for sending inappropriate images in e-mails. http://www.isaca.org/Journal/archives/2005/Volume-6/Pages/Best-Practices-for-Establishing-an-EffectiveWorkplace-Policy-for-Acceptable-Computer-Usage1.aspx LCPS Acceptable Use Students and parents agree by signing the Student R&R page and turning in first week of school each year. Always read the documents before you sign them! Review LCPS Policy and Classroom Policy as a class. LCPS Acceptable Use This computer system is the property of Loudoun County Public Schools. Unauthorized access to this computer system is forbidden. Users (authorized or unauthorized) have no explicit or implicit expectations of privacy. By accessing this computer system, you voluntarily consent to all LCPS’s policies and regulations and you voluntarily consent to having your actions, emails or other electronic information monitored, recorded, seized and disclosed to authorized personnel as determined by LCPS. Class Assignment After class discussion and reviewing the LCPS and BWHS Marketing AUP’s – the students will work with a partner to demonstrate their knowledge and understanding of Internet Safety/Acceptable Use Policy in the workplace and in the classroom. Cover slide, Agenda slide, 4 content slides, conclusion slide HVANDYKE@LCPS.ORG TO DO: Students will create a PowerPoint to share with the class that depicts: 1. Importance of having an Acceptable Use Policy (AUP) 2. Identify 3 ways you can violate an AUP (i.e. unacceptable behavior) 3. What can happen if you violate the AUP in your Marketing class 4. Identify 2 risks of posting personal and work information on the Internet (i.e. on social networking sites, job search sites)