Be sure to include review tracking to track any changes you`ve made. And don`t forget that employees sign the new directive for acceptable use during the update. Based on the dynamics of the Internet and cloud/Web services, iVision reserves the right to make changes to upP at any time and without notice. This UPA may not present all possible possibilities of how you or your clients, agents or affiliates behave inappropriately. We use the right to determine, on our own exclusive judgment, which activities are unacceptable. Many companies and educational institutions require employees or students to sign an acceptable usage policy before obtaining a network identifier. From the moment a user receives a user ID for network and/or computer systems, he is solely responsible for all actions performed when using that user ID. In particular, this is a violation of this agreement: these are some examples of acceptable applications and models: AUPs are generally used by organizations that provide networks for internal use, such as commercial enterprises. B, schools and universities. They are also widely used by websites to inform site visitors and customers of what is allowed on the site. For example, some companies do not allow employees to use the after-work COMPANY for activities (for example.
B games) that offer no value to the company. It has to be made clear to the workers. Users can only watch through AUPS or not read them at all. This often happens because AUPS uses standard backs and don`ts and can be written in a way that is difficult to read and understand. For the user, this is a mistake because he or she may never know unusual requirements. For example, some social networking sites may not allow for discussions that denigrate or offend certain religious, spine or political groups. The majority of the UPA also exposes the consequences of a violation of established rules. These range from warning users to deactivating users` accounts, to extreme measures such as legal action. Which websites should be banned during working hours? Many are obvious, like pornography or gambling, but what about Spotify or news sites? Do some people, like your marketing team, need access to social media? Don`t forget to outline acceptable behaviors for sites like this, which have potential for abuse. Staff need to know what the organization is doing when it comes to data. What needs to be secured? What should be encrypted during transmission? Why is this data valuable? Is it a legal matter, a business secret, or perhaps only sensitive and embarrassing when it has been leaked or lost? If this is well defined in advance, staff can be expected to apply in general, even if they forget a specific rule defined by the directive.
As I said earlier, your policy should be helpful so that employees understand why it exists and get their money from the culture of compliance. Therefore, the rules you develop for good policy should be practical. If something serious happened (regardless of whether it was dealing with the end user), what would be the consequence for the organization? Would this lead to system failures that affect the organization and its partners? See examples of acceptable use to illustrate Brown`s interpretation of authorized use. Most UPR documents focus on the section detailing unacceptable uses of the network, as reported in the University of Chicago`s AUP.