Acceptable Use Policy by Andrew Breen. What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which.

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

Rockingham County Public Schools Technology Acceptable Use Policy
Northside I.S.D. Acceptable Use Policy
DO-IT TRAINING KIT Acceptable Use Policy
Woodland Hills School District Computer Network Acceptable Use Policy.
2014 HIPAA Refresher Omnibus Rule & HIPAA Security.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
CREATED BY: HMIS Security Awareness Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013.
Policy 6460 Staff Use of Computerized Information Resources Regulation 6460 R-Staff Use of Computerized Information Resources Regulation 6460 R.2 Staff.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Boyertown Area School District Acceptable Use Policy.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Acceptable Use Policies What you need to know as an elementary school teacher.
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
For Students of Humble ISD
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Copyright TurboPCI, Inc. All rights reserved. PCI Compliance Security Awareness Training 31 December 2011.
Security Awareness Norfolk State University Policies.
CPS Acceptable Use Policy Day 2 – Technology Session.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Chapter 6 Acceptable-Use Policies: Human Defenses Trevor Norsworthy Christina Richardson.
Electronic Use Policies.   Social Media  Internet.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
Employee Guidelines for Acceptable Use of Technology Resources.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
00870B2F.0/Internet%20Safety.jpg.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
Information Security Training for People who Supervise Computer Users.
Our Acceptable Use Policy An Overview What is an Acceptable Use Policy (AUP)?
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Wayne County Public Schools Technology Usage and Policies.
As a student in the NCCVT school district, you are privileged to have access to your own individual account on the District network. Your account.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
INTERNET SAFETY.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
Security and Ethics Safeguards and Codes of Conduct.
Woodland Hills School District Computer Network Acceptable Use Policy.
ITACS L.L.P. Policy And Procedures Group 1. Objective: To establish companywide policy with regards to personal device usage both on and off of the company.
ANNUAL HIPAA AND INFORMATION SECURITY EDUCATION. KEY TERMS  HIPAA - Health Insurance Portability and Accountability Act. The primary goal of the law.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
Laptop 101 Wilkes County Schools B.T. Training Wilkes County Schools B.T. Training
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
PCI Compliance Security Awareness Training 31 December 2011
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Server Security Policy
Internet Safety and Acceptable Use Policies.
Internet Safety and Acceptable Use Policies.
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Student User Agreement and Policy 2022
Woodland Hills School District
Protecting Student Data
Presentation transcript:

Acceptable Use Policy by Andrew Breen

What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which restrict the ways in which the network may be used According to Wikipedia: a set of rules applied by many transit networks which restrict the ways in which the network may be used usually found in the terms of service agreement usually found in the terms of service agreement Plays a big role in information security Plays a big role in information security

SANS Guidelines – Overview Intention for publishing an AUP Intention for publishing an AUP What computer systems and devices it applies to What computer systems and devices it applies to Who it applies to Who it applies to

2.0 - Purpose Why Rules exist Why Rules exist What could happen if rules are not followed What could happen if rules are not followed

3.0 – Scope Who policy applies to Who policy applies to What equipment policy applies to What equipment policy applies to

4.0 - Policy 4.1 General Use and Ownership 4.1 General Use and Ownership privacy is desired, but all data is propery of company privacy is desired, but all data is propery of company exercise good judgement for personal use exercise good judgement for personal use encryption is encouraged encryption is encouraged authorized personnel may monitor system authorized personnel may monitor system compliance audits may occur compliance audits may occur

4.0 – Policy (cont.) 4.2 – Security and Proprietary Information 4.2 – Security and Proprietary Information some information on network may be confidential some information on network may be confidential keep passwords private and change frequently keep passwords private and change frequently all workstations should have automatic password protected screensavers all workstations should have automatic password protected screensavers use encryption use encryption special care for laptops special care for laptops non-business postings online must contain disclaimer non-business postings online must contain disclaimer be cautious of attachments be cautious of attachments

4.0 – Policy (cont) 4.3 – Unacceptable Use 4.3 – Unacceptable Use unless specified, these activity are prohibited unless specified, these activity are prohibited no unlawful activities permitted no unlawful activities permitted

4.0 – Policy (cont) System and Network Activities System and Network Activities violation of intellectual property rights violation of intellectual property rights exporting software in violation of export control laws exporting software in violation of export control laws malicious programs released on network malicious programs released on network fraud fraud giving account username and password to anyone giving account username and password to anyone port scanning port scanning interfering with other users access interfering with other users access

4.0 – Policy (cont) and Communications and Communications sending spam sending spam harassment harassment forwarding chain letters forwarding chain letters forging headers forging headers

5.0 - Enforcement details disciplinary action if employee violates policy details disciplinary action if employee violates policy

6.0 - Definitions any relevant Definitions any relevant Definitions

7.0 – Revision History history of revisions to document history of revisions to document right to make revisions in future right to make revisions in future

Examples of Acceptable Use Policies The University of Scranton: zation/resnet/computingpolicy.shtml The University of Scranton: zation/resnet/computingpolicy.shtml zation/resnet/computingpolicy.shtml zation/resnet/computingpolicy.shtml Earthlink: cies/use/ Earthlink: cies/use/ cies/use/ cies/use/