Acceptable Computer Usage Policy

SHARE

Acceptable Computer Usage Policy
-Eric Reynolds
Wood Networks, Senior Technician
Whether presented as part of the company handbook, or as a standalone document, an Acceptable Computer Usage Policy is a must in today’s workplace. Having a good policy in place will clearly communicate to the staff what is acceptable and what is not. The main reason behind Acceptable Computer Usage Policy is to protect computer investments and company data. Here is a look at what should be contained in an Acceptable Computer Usage Policy.The Policy Statement – This statement includes the items covered and has a brief overview of what is to come. It also outlines “excessive” use.

The Ownership Statement – This statement outlines what data is owned by the company. Many companies claim ownership of any data residing on their network or created while employed at the company.

The Confidentiality Statement – This outlines what is considered private and what is subject to monitoring. E-mail is usually mentioned specifically as an item which can be monitored.

The Internet Statement – This outlines internet use in much greater detail. It should mention whether personal browsing is allowed during breaks and lunch and it should include a liability statement for not following company procedure.

The Personal Electronic Equipment Statement – This outlines the use of personal computers, phones, digital cameras, and any other electronic devices. It should state that no electronic device be hooked to the network without proper consent.

The Conclusion – This is an overview of all of the policies in place, and a clear statement regarding action in case of violation of the policy.

UPCOMING VIRTUAL EVENTS

Demystifying Cyber Security for SMBs

sb-cyber-security-master-class

The continually changing threat landscape requires us to update best practices and add new concepts to keep your organization safe.

SESSION 4: Cyber Security Strategy
Watch On-Demand

SESSION 5: Cyber Insurance & MFA
Watch On-Demand

SESSION 6: Threat Detection | JAN. 15

Microsoft Copilot
Master Class Workshop

sb-microsoft-copilot-master-class

eMazzanti will host 60-minute Master Classes, that speak to how AI can help your business streamline and grow.

In each session, you will have Artificial Intelligence and Automation explained, view a live demo of Copilot, and see it live in action in a dynamic format.

RESOURCES

Cyber Security Awareness Hub

sb-Cyber-Security-Awareness-Hub

Cyber Security Awareness Kit, designed to be delivered to your team in bitesize chunks.

We are sharing the resources and highlighting services your organization needs, covering everything from multifactor authentication to software updates, showing your users just how easy it is to improve their security posture.

Resource Library

sb-resource-library

Insights to help you do what you do better, faster and more profitably.

> Tips to Stay Protected Against Phishing Attacks

> Understanding Ransomware 

> The 6 Known Wi-Fi Threat Categories Targeting Your Business and How to Defend Against Them

> Practical Advice for Avoiding Phishing Emails

Recent Articles

NEWSLETTER

Categories