![]() However, with BYOD, an AUP is necessary to prevent security issues and misunderstandings about how these devices should be used.īest practices to ensure AUPs are followed Many organizations allow or require employees to use personal devices for business purposes. AUPs prevent users from unauthorized access to proprietary or confidential data and unauthorized use of that data. Accessing private or confidential information.Use policies set restrictions on how non-employees can use company information systems and network resources. These include rules around accessing restricted information changing access data, such as passwords opening questionable email attachments using public Wi-Fi services and using company approved authentication procedures. An AUP sets rules related to an organization's IT security policies. They often stipulate whether these resources can be used for personal email or other electronic communications, shopping, playing computer games and gambling. Policies usually cover whether an organization's computer systems can be used only for business purposes. An AUP sets parameters on how employees should use social media sites, often stipulating what should not be discussed about the company and its business. The following are examples of areas where an acceptable use policy could be helpful: Statements about when a person is in violation of this policy and when law enforcement might be called in could also be included. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |