Categories: Articles

Acceptable Computer Usage Policy

Acceptable Computer Usage Policy
-Eric Reynolds
Wood Networks, Senior Technician
Whether presented as part of the company handbook, or as a standalone document, an Acceptable Computer Usage Policy is a must in today’s workplace. Having a good policy in place will clearly communicate to the staff what is acceptable and what is not. The main reason behind Acceptable Computer Usage Policy is to protect computer investments and company data. Here is a look at what should be contained in an Acceptable Computer Usage Policy.The Policy Statement – This statement includes the items covered and has a brief overview of what is to come. It also outlines “excessive” use.

The Ownership Statement – This statement outlines what data is owned by the company. Many companies claim ownership of any data residing on their network or created while employed at the company.

The Confidentiality Statement – This outlines what is considered private and what is subject to monitoring. E-mail is usually mentioned specifically as an item which can be monitored.

The Internet Statement – This outlines internet use in much greater detail. It should mention whether personal browsing is allowed during breaks and lunch and it should include a liability statement for not following company procedure.

The Personal Electronic Equipment Statement – This outlines the use of personal computers, phones, digital cameras, and any other electronic devices. It should state that no electronic device be hooked to the network without proper consent.

The Conclusion – This is an overview of all of the policies in place, and a clear statement regarding action in case of violation of the policy.

Bryan Antepara: IT Specialist

Bryan Antepara is a leader in Cloud engagements with a demonstrated history of digital transformation of business processes with the user of Microsoft Technologies powered by the team of eMazzanti Technologies engineers.

Bryan has a strong experience working with Office 365 cloud solutions, Business Process, Internet Information Services (IIS), Microsoft Office Suite, Exchange Online, SharePoint Online, and Customer Service.

He has the ability to handle the complexity of moving data in and out of containers and cloud sessions, makes him the perfect candidate to help organizations large and small migrate to new and more efficient platforms.  Bryan is a graduate of the University of South Florida and is Microsoft Certification holder.

Recent Posts

Innovations in Microsoft 365 Support the Modern Workplace and Drive Productivity

The office worker of even 20 years ago could scarcely envision today’s dynamic and interconnected…

7 days ago

Harnessing AI: Beyond Self-Driving Cars

Artificial Intelligence (AI) has taken center stage, captivating attention primarily through its role in self-driving…

7 days ago

Unleash Your Creativity with Microsoft’s Copilot Image Creator

The ability to generate compelling, original images using AI is changing the way we think…

2 weeks ago

How to Choose the Right Microsoft Dynamics 365 Sales Partner and Why It Matters

With Microsoft Dynamics 365 Sales, businesses gain a powerful tool for nurturing leads, leveraging AI-based…

3 weeks ago

eMazzanti Technologies Ranked Among World’s Top Managed Service Providers

Annual Channel Futures MSP 501 global ranking identifies industry’s best-in-class businesses on Tech Industry’s most…

4 weeks ago

Are Vendors The Weak Spot In Your Cyber Defenses?

  Carl Mazzanti is the president of eMazzanti Technologies in Hoboken. You engage with vendors…

4 weeks ago