Acceptable Use Policy Overview Computer Science Essay

Published:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

The purpose of this policy is to establish acceptable and unacceptable use of electronic devices and network resources at Superior Health Care System in conjunction with its established culture of ethical and lawful behavior, openness, trust, and integrity.

Superior Health Care System provides computer devices, networks, and other electronic information systems to meet missions, goals, and initiatives and must manage them responsibly to maintain the confidentiality, integrity, and availability of its information assets. This policy requires the users of information assets to comply with company policies and protects the company against damaging legal issues.

Scope

All employees, contractors, consultants, temporary and other workers at Superior Health Care System, including all personnel affiliated with third parties must adhere to this policy. This policy applies to information assets owned or leased by Superior Health Care System, or to devices that connect to a Superior Health Care System network or reside at a Superior Health Care System site.

Information Security must approve exceptions to this policy in advance through submission of an exception request form. All exception requests must be made two weeks prior to request exception period.

Policy Statement

General Requirements

You are responsible for exercising good judgment regarding appropriate use of Superior Health Care System resources in accordance with Superior Health Care System policies, standards, and guidelines. Superior Health Care System resources may not be used for any unlawful or prohibited purpose.

For security, compliance, and maintenance purposes, authorized personnel may monitor and audit equipment, systems, and network traffic per the Audit Policy. Devices that interfere with other devices or users on the Superior Health Care System network may be disconnected. Information Security prohibits actively blocking authorized audit scans. Firewalls and other blocking technologies must permit access to the scan sources.

System Accounts

You are responsible for the security of data, accounts, and systems under your control. Keep passwords secure and do not share account or password information with anyone, including other personnel, family, or friends. Providing access to another individual, either deliberately or through failure to secure its access, is a violation of this policy.

You must maintain system-level and user-level passwords in accordance with the Password Policy.

You must ensure through legal or technical means that proprietary information remains within the control of Superior Health Care System at all times. Conducting Superior Health Care System business that results in the storage of proprietary information on personal or non-Superior Health Care System controlled environments, including devices maintained by a third party with whom Superior Health Care System does not have a contractual agreement, is prohibited. This specifically prohibits the use of an e-mail account that is not provided by Superior Health Care System, or its customer and partners, for company business.

Computing Assets

You are responsible for ensuring the protection of assigned Superior Health Care System assets that includes the use of computer cable locks and other security devices. Laptops left at Superior Health Care System overnight must be properly secured or placed in a locked drawer or cabinet. Promptly report any theft of Superior Health Care System assets to the Chief Information Officer.

All PCs, PDAs, laptops, and workstations must be secured with a password-protected screensaver with the automatic activation feature set to 10 minutes or less. You must lock the screen or log off when the device is unattended.

Devices that connect to the Superior Health Care System network must comply with the Minimum Access Policy.

Do not interfere with corporate device management or security system software, including, but not limited to, antivirus, content filtering services, hardware firewall devices, and content tracking services.

Network Use

You are responsible for the security and appropriate use of Superior Health Care System network resources under your control. Using Superior Health Care System resources for the following is strictly prohibited:

Causing a security breach to either Superior Health Care System or other network resources, including, but not limited to, accessing data, servers, or accounts to which you are not authorized; circumventing user authentication on any device; or sniffing network traffic.

Causing a disruption of service to either Superior Health Care System or other network resources, including, but not limited to, ICMP floods, packet spoofing, denial of service, heap or buffer overflows, and forged routing information for malicious purposes.

Introducing honeypots, honeynets, or similar technology on the Superior Health Care System network.

Violating copyright law, including, but not limited to, illegally duplicating or transmitting copyrighted pictures, music, video, and software. See the Internet Use Policy for additional information on copyright restrictions.

Exporting or importing software, technical information, encryption software, or technology in violation of international or regional export control laws. See the Computer Management Policy for additional information on export and transfer restrictions.

Use of the Internet or Superior Health Care System network that violates the Superior Health Care System, Superior Health Care System policies, or local laws.

Intentionally introducing malicious code, including, but not limited to, viruses, worms, Trojan horses, e-mail bombs, spyware, adware, and keyloggers.

Port scanning or security scanning on a production network unless authorized in advance by Information Security.

Electronic Communications

The following are strictly prohibited:

Inappropriate use of communication vehicles and equipment, including, but not limited to, supporting illegal activities, and procuring or transmitting material that violates Superior Health Care System policies against harassment or the safeguarding of confidential or proprietary information.

Sending Spam via e-mail, text messages, pages, instant messages, voice mail, or other forms of electronic communication.

Forging, misrepresenting, obscuring, suppressing, or replacing a user identity on any electronic communication to mislead the recipient about the sender.

Posting the same or similar non-business-related messages to large numbers of Usenet newsgroups (newsgroup spam).

Use of a Superior Health Care System e-mail or IP address to engage in conduct that violates Superior Health Care System policies or guidelines. Posting to a public newsgroup, bulletin board, or listserv with a Superior Health Care System e-mail or IP address represents Superior Health Care System to the public; therefore, you must exercise good judgment to avoid misrepresenting or exceeding your authority in representing the opinion of the company.

Enforcement

An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. A violation of this policy by a temporary worker, contractor or vendor may result in the termination of their contract or assignment with Superior Health Care System.

Definitions

Term

Definition

honeypot, honeynet

Network decoys that serve to distract attackers from valuable machines on a network. The decoys provide an early warning for intrusion detection and detailed information on vulnerabilities.

Spam

Electronic junk mail or junk newsgroup postings. Messages that are unsolicited, unwanted, and irrelevant.

This template was obtained from www.first.org.

Writing Services

Essay Writing
Service

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing
Service

Reports for any audience. Perfectly structured, professionally written, and tailored to suit your exact requirements.

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision
Service

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.