Document 17625314

advertisement
What is an Acceptable Use Policy?
 Acceptable Use Policy (AUP)
 Code of Conduct for Internet Use
 Used by Organizations and Businesses
 Outlines agreement in writing
 Document signed by employee/participant and the
governing organization or business
What’s Included in Policy?
 Identifies owner of computers/network
 Defines intended use
 Identifies unacceptable use
 Notes consequences
 Requires signature of acceptance
Why Have a Policy?
 Protect the company or organization
 Protect the employee (or computer user)
 Maintains security
Laws Governing Internet Use
 Copyright laws
 Child protection laws
 Privacy rights and safety
 National security
Laws continue to evolve and change!
Unacceptable Behavior
 Visiting sites that contain obscene, hateful or otherwise illegal
material
 Using the computer to perpetrate any form of fraud or music piracy
 Using the Internet to send offensive or harassing material to other
users
 Hacking into unauthorized areas
 Publishing defamatory and/or knowingly false material about your
company, colleagues and/or customers on social networking sites,
blogs
Unacceptable Behavior
 Revealing confidential information about your company in a personal
online posting, upload or transmission (financial information or
information relating to customers, business plans, policies, staff
and/or internal discussions)
 Undertaking deliberate activities that waste staff effort or networked
resources
 Introducing any form of malicious software into the corporate
network
AUP Consequences
 Chevron Corp. settled out of court—paying US $2.2
million—after the company was sued because of an
e-mail circulated within the company containing
offensive material.
 Microsoft Corp. settled for US $2.2 million a sexual
harassment suit involving inappropriate e-mails
sent within the company.
http://www.isaca.org/Journal/archives/2005/Volume-6/Pages/Best-Practices-for-Establishing-an-EffectiveWorkplace-Policy-for-Acceptable-Computer-Usage1.aspx
AUP Consequences
 Xerox fired more than 40 employees for downloading
inappropriate images. These downloads choked
Xerox's computer system and prevented employees
from sending and receiving legitimate e-mails.
 Wachovia Securities fired six brokers for sending
inappropriate images in e-mails.
http://www.isaca.org/Journal/archives/2005/Volume-6/Pages/Best-Practices-for-Establishing-an-EffectiveWorkplace-Policy-for-Acceptable-Computer-Usage1.aspx
LCPS Acceptable Use
 Students and parents agree by signing the
Student R&R page and turning in first week
of school each year.
Always read the documents
before you sign them!
 Review LCPS Policy and Classroom Policy as a
class.
LCPS Acceptable Use
This computer system is the property of Loudoun
County Public Schools. Unauthorized access to
this computer system is forbidden. Users
(authorized or unauthorized) have no explicit or
implicit expectations of privacy. By accessing this
computer system, you voluntarily consent to all
LCPS’s policies and regulations and you
voluntarily consent to having your actions, emails
or other electronic information monitored,
recorded, seized and disclosed to authorized
personnel as determined by LCPS.
Class Assignment
 After class discussion and reviewing the LCPS and BWHS
Marketing AUP’s – the students will work with a partner to
demonstrate their knowledge and understanding of Internet
Safety/Acceptable Use Policy in the workplace and in the
classroom.
 Cover slide, Agenda slide, 4 content slides, conclusion slide
HVANDYKE@LCPS.ORG
TO DO:
Students will create a PowerPoint to share with the class that depicts:
1.
Importance of having an Acceptable Use Policy (AUP)
2. Identify 3 ways you can violate an AUP (i.e. unacceptable behavior)
3. What can happen if you violate the AUP in your Marketing class
4. Identify 2 risks of posting personal and work information on the
Internet (i.e. on social networking sites, job search sites)
Download