Categories: Articles

Acceptable Computer Usage Policy

Acceptable Computer Usage Policy
-Eric Reynolds
Wood Networks, Senior Technician
Whether presented as part of the company handbook, or as a standalone document, an Acceptable Computer Usage Policy is a must in today’s workplace. Having a good policy in place will clearly communicate to the staff what is acceptable and what is not. The main reason behind Acceptable Computer Usage Policy is to protect computer investments and company data. Here is a look at what should be contained in an Acceptable Computer Usage Policy.

The Policy Statement – This statement includes the items covered and has a brief overview of what is to come. It also outlines “excessive” use.

The Ownership Statement – This statement outlines what data is owned by the company. Many companies claim ownership of any data residing on their network or created while employed at the company.

The Confidentiality Statement – This outlines what is considered private and what is subject to monitoring. E-mail is usually mentioned specifically as an item which can be monitored.

The Internet Statement – This outlines internet use in much greater detail. It should mention whether personal browsing is allowed during breaks and lunch and it should include a liability statement for not following company procedure.

The Personal Electronic Equipment Statement – This outlines the use of personal computers, phones, digital cameras, and any other electronic devices. It should state that no electronic device be hooked to the network without proper consent.

The Conclusion – This is an overview of all of the policies in place, and a clear statement regarding action in case of violation of the policy.

eMazzanti Technologies

Recent Posts

How to Manage Remote Workers

With a global customer base, eMazzanti Technologies positions engineers and project managers in various locations…

4 years ago

Tips for Transitioning to Remote Work

Over a period of three weeks, most of the workforce in the United States found…

4 years ago

Collaborate with Exceptional Security and Privacy Using Microsoft 365 for Remote Work

Three years ago, Microsoft launched Teams, a powerful component of Office 365 (now Microsoft 365),…

4 years ago

You Look Marvelous! The Sprint to Video-based Team Interaction

In our new work-from-home (WFH) world, the requirement for on demand video conferencing has exploded…

4 years ago

5 Endpoint Security Best Practices When Remote Work Takes Center Stage

With the majority of employees working from home this spring, organizations have encountered new challenges.…

4 years ago

Cloud-based Security Solutions Deliver Powerful, Scalable Protection for SMBs

The average small to medium business (SMB) has most likely migrated at least some essential…

4 years ago