How is an acceptable use policy typically used?
What will be an ideal response?
ANSWER: An AUP (acceptable use policy) explains to users what they can and cannot do while accessing a network's resources. It also explains penalties for violations, and might describe how these measures protect the network's security. Employers should never assume that employees inherently know what is acceptable use of company IT resources and what is not. Detailing this information clarifies expectations for everyone. Some of the restrictions might include the following:
* Don't do anything illegal.
* Don't try to circumvent network security restrictions.
* Don't market products or services to other network users.
* Don't forward spam e-mail.
* Don't violate the rights of any person or organization.
* Don't violate copyright, trade secret, patent, intellectual property, or other regulations.
* Don't export software, technical information, or encryption technology.
* Always sign off or lock a device when not in use.
* Use company resources to fulfill job obligations, and not for personal tasks.
* Be aware that activities on the network can be and are monitored and may be formally audited.
* Immediately report any suspected compromise of confidential data or customer privacy.
You might also like to view...
People who refer to written documents frequently while working on their computers should use a document holder to keep their documents close to their monitors. _________________________
Answer the following statement true (T) or false (F)
Declan just purchased the Microsoft Office suite and is learning about all of the program options. Declan learns that the Microsoft Office spreadsheet application is ____.
A. Word B. Access C. PowerPoint D. Excel