Get help now

Acceptable Use Policy (AUP) Definition

  • Pages 3
  • Words 540
  • Views 339
  • dovnload



  • Pages 3
  • Words 540
  • Views 339
  • Academic anxiety?

    Get original paper in 3 hours and nail the task

    Get your paper price

    124 experts online

    Moreover, the e-mail system is not to be used o solicit or proselytize for commercial ventures, religious or political causes, or other non job-related solicitations. The Company reserves and intends to exercise the right to review, audit, intercept, access, disclose, and use all messages created, received, or sent over its e-mail system for any purpose. The contents of e-mail may be disclosed and used by the company to protect its rights and/or property without the permission of the employee, in the company’s discretion.

    The confidentiality of any message should not be assumed. Even when a message is erased, it is still possible to retrieve and read that message. Further, passwords for security do not guarantee confidentiality. All passwords must be disclosed to the company or they are invalid and cannot be used. Employees not involved in maintenance or operation of the company’s e-mail system are not authorized to retrieve or read any e-mail not sent to them. Any exception to this policy requires the approval by senior management of the company.

    Internet The company’s computer network, including its connection to the Internet, is to be used for business-related purposes. Any unauthorized use of the Internet is strictly prohibited. Unauthorized use includes, but is not limited to, connecting, posting, or downloading pornographic material; engaging in computer “hacking” and other related activities; attempting to disable or compromise the security of information contained on the company’s computers; or otherwise using the company s computers in a manner which interferes with their business purpose.

    Employees should not send highly confidential information through the Internet without encryption. Anything sent through the Internet passes through a number of different computer systems, all with different levels of security. The confidentiality of messages may be compromised at any point along the way. Because postings placed on the Internet may display the company’s address, make certain before posting information on the Internet that the information reflects the standards and policies of the company.

    Under no circumstances should information of a confidential, sensitive, or otherwise proprietary nature be placed on the Internet. Information posted or viewed on the Internet may constitute published material. Therefore, reproduction of information posted or otherwise available over the Internet may be done only by express permission of the author. Offensive, sexually suggestive, obscene, lewd, demeaning, or disruptive messages are prohibited.

    This includes, but is not limited to, messages that are inconsistent with the company’s policies on equal employment opportunity, anti- discrimination, and anti-harassment (including sexual harassment). Use of the company’s e-mail/Lenten system from a personal or company-owned computer through company-owned connections are subject to the same policies that apply to use from within company facilities. Computers Due to the sensitive nature of computers and the software contained therein, all employees provided with computers may not download, install, alter, or delete any software, programs, and information (i. . , e-mails, spread sheets, databases, Microsoft Word, or other word processing documents) contained on company computers without the express authorization of the company. The company reserves the right to inspect or review its computers and the information contained therein at any time without notice or consent. Any employee who violates the company’s e-mail/Lenten/computer usage policy hall be subject to discipline, up to and including employment termination.

    This essay was written by a fellow student. You may use it as a guide or sample for writing your own paper, but remember to cite it correctly. Don’t submit it as your own as it will be considered plagiarism.

    Need a custom essay sample written specially to meet your requirements?

    Choose skilled expert on your subject and get original paper with free plagiarism report

    Order custom paper Without paying upfront

    Acceptable Use Policy (AUP) Definition. (2018, Jul 01). Retrieved from

    Hi, my name is Amy 👋

    In case you can't find a relevant example, our professional writers are ready to help you write a unique paper. Just talk to our smart assistant Amy and she'll connect you with the best match.

    Get help with your paper
    We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy