Question

In: Computer Science

Project Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a...

Project Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment

Solutions

Expert Solution

Email

Employees can use their corporate email accounts for both work-related and personal purposes as long as they don’t violate this policy’s rules. Employees shouldn’t use their corporate email to:

  • Register to illegal, unsafe, disreputable or suspect websites and services.
  • Send obscene, offensive or discriminatory messages and content.
  • Send unauthorized advertisements or solicitation emails.
  • Sign up for a competitor’s services unless authorized.

The company has the right to monitor corporate emails. We also have the right to monitor websites employees visit on computers.

Acceptable internet use policy

Use of the internet by employees of [business name] is permitted and encouraged where such use supports the goals and objectives of the business.

However, [business name] has a policy for the use of the internet whereby employees must ensure that they:

  • comply with current legislation
  • use the internet in an acceptable way
  • do not create unnecessary business risk to the company by their misuse of the internet

Unacceptable behaviour

In particular the following is deemed unacceptable use or behaviour by employees:

  • visiting internet sites that contain obscene, hateful, pornographic or otherwise illegal material
  • using the computer to perpetrate any form of fraud, or software, film or music piracy
  • using the internet to send offensive or harassing material to other users
  • downloading commercial software or any copyrighted materials belonging to third parties, unless this download is covered or permitted under a commercial agreement or other such licence
  • hacking into unauthorised areas
  • publishing defamatory and/or knowingly false material about [business name], your colleagues and/or our customers on social networking sites, 'blogs' (online journals), 'wikis' and any online publishing format
  • revealing confidential information about [business name] in a personal online posting, upload or transmission - including financial information and information relating to our customers, business plans, policies, staff and/or internal discussions
  • undertaking deliberate activities that waste staff effort or networked resources
  • introducing any form of malicious software into the corporate network

Company-owned information held on third-party websites

If you produce, collect and/or process business-related information in the course of your work, the information remains the property of [business name]. This includes such information stored on third-party websites such as webmail service providers and social networking sites, such as Facebook and LinkedIn.

Monitoring

[business name] accepts that the use of the internet is a valuable business tool. However, misuse of this facility can have a negative impact upon employee productivity and the reputation of the business.

In addition, all of the company's internet-related resources are provided for business purposes. Therefore, the company maintains the right to monitor the volume of internet and network traffic, together with the internet sites visited. The specific content of any transactions will not be monitored unless there is a suspicion of improper use.

Sanctions

Where it is believed that an employee has failed to comply with this policy, they will face the company's disciplinary procedure. If the employee is found to have breached the policy, they will face a disciplinary penalty ranging from a verbal warning to dismissal. The actual penalty applied will depend on factors such as the seriousness of the breach and the employee's disciplinary record. [These procedures will be specific to your business. They should reflect your normal operational and disciplinary processes. You should establish them from the outset and include them in your acceptable use policy.]

Agreement

All company employees, contractors or temporary staff who have been granted the right to use the company's internet access are required to sign this agreement confirming their understanding and acceptance of this policy.


Related Solutions

You have been asked to audit your company security plan as it applies to acceptable employee use of the Internet and e-mail.
You have been asked to audit your company security plan as it applies to acceptable employee use of the Internet and e-mail. Write a preliminary audit plan, including scope, objectives, and audit steps.
12. When you send someone an e-mail address, it travels across the Internet to the ____________________...
12. When you send someone an e-mail address, it travels across the Internet to the ____________________ e-mail server at your ISP, then to the incoming e-mail server at your recipient's ISP.
Creating an e-mail Message Class e-mail. How we often communicate today…from Christmas lists, to pick up...
Creating an e-mail Message Class e-mail. How we often communicate today…from Christmas lists, to pick up from the store lists, to-do lists, to one-liner messages…all examples of communication using an e-mail message. Lab Assignment Objectives Understand what is meant by a class object's type and how the type determines the operators and methods that can be applied to the object. Know what a constructor does. Understand how a class corresponds to a namespace such that object method invocations translate to...
A small company involved in​ e-commerce is interested in statistics concerning the use of​ e-mail. A...
A small company involved in​ e-commerce is interested in statistics concerning the use of​ e-mail. A poll found that 37% of a random sample of 1122 adults, who use a computer at their​ home, work, or​ school, said they do not send or receive​ e-mail. Complete parts a through e. ​a) Find the margin of error for this poll if we want 90​% confidence in our estimate of the percent of American adults who do not use​ e-mail. b.) Explain...
E-MAIL Security Policies / Enterprise Security StrategyPlanInstructions: In NO LESSthan 200 words, answer...
E-MAIL Security Policies / Enterprise Security Strategy PlanInstructions: In NO LESS than 200 words, answer the following question.Create an outline that could serve as a template for creating future security policies for an IT Network's E-MAIL functionality. Your template should reflect 2–3 key parts of a security policy related to intranet operations.For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want to borrow elements from...
In David Crystal's book "Language and the Internet" in chapter 4 (The language of e-mail) what...
In David Crystal's book "Language and the Internet" in chapter 4 (The language of e-mail) what is the main idea in this chapter?
SCENARIO: A mid-sized employment agency needs your advice on e-mail policies. They want to prepare a...
SCENARIO: A mid-sized employment agency needs your advice on e-mail policies. They want to prepare a one-page document to distribute to employees. Since you're only being asked for advice and to not create the actual document, perform the following tasks: List items you would recommend including in this document, Provide suggestions as to who the key resources should be involved in creating the policy, and Identify the corporate entity, department, or individual to distribute the policy.
A) In​ 1997, a survey of 820 households showed that 137 of them use​ e-mail. Use...
A) In​ 1997, a survey of 820 households showed that 137 of them use​ e-mail. Use those sample results to test the claim that more than​ 15% of households use​ e-mail. Use a 0.05 significance level. Use this information to answer the following questions. What is the​ P-value? B) In a study of 420,149 cell phone​ users, 115 subjects developed cancer of the brain or nervous system. Test the claim of a somewhat common belief that such cancers are affected...
Identify how technology applications such as e-mail, the Internet, telecommunications, and social networking can both facilitate...
Identify how technology applications such as e-mail, the Internet, telecommunications, and social networking can both facilitate and hinder personal time management.
Identify how technology applications such as e-mail, the Internet, telecommunications, and social networking can both facilitate...
Identify how technology applications such as e-mail, the Internet, telecommunications, and social networking can both facilitate and hinder personal time management
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT