Categories: Articles

Acceptable Computer Usage Policy

Acceptable Computer Usage Policy
-Eric Reynolds
Wood Networks, Senior Technician
Whether presented as part of the company handbook, or as a standalone document, an Acceptable Computer Usage Policy is a must in today’s workplace. Having a good policy in place will clearly communicate to the staff what is acceptable and what is not. The main reason behind Acceptable Computer Usage Policy is to protect computer investments and company data. Here is a look at what should be contained in an Acceptable Computer Usage Policy.The Policy Statement – This statement includes the items covered and has a brief overview of what is to come. It also outlines “excessive” use.

The Ownership Statement – This statement outlines what data is owned by the company. Many companies claim ownership of any data residing on their network or created while employed at the company.

The Confidentiality Statement – This outlines what is considered private and what is subject to monitoring. E-mail is usually mentioned specifically as an item which can be monitored.

The Internet Statement – This outlines internet use in much greater detail. It should mention whether personal browsing is allowed during breaks and lunch and it should include a liability statement for not following company procedure.

The Personal Electronic Equipment Statement – This outlines the use of personal computers, phones, digital cameras, and any other electronic devices. It should state that no electronic device be hooked to the network without proper consent.

The Conclusion – This is an overview of all of the policies in place, and a clear statement regarding action in case of violation of the policy.

Bryan Antepara: IT Specialist

Bryan Antepara is a leader in Cloud engagements with a demonstrated history of digital transformation of business processes with the user of Microsoft Technologies powered by the team of eMazzanti Technologies engineers.

Bryan has a strong experience working with Office 365 cloud solutions, Business Process, Internet Information Services (IIS), Microsoft Office Suite, Exchange Online, SharePoint Online, and Customer Service.

He has the ability to handle the complexity of moving data in and out of containers and cloud sessions, makes him the perfect candidate to help organizations large and small migrate to new and more efficient platforms.  Bryan is a graduate of the University of South Florida and is Microsoft Certification holder.

Recent Posts

Understand the Benefits and Limitations of Automated Tools in Penetration Testing

Penetration testing, the process of simulating cyberattacks to identify vulnerabilities, plays an essential role in…

4 days ago

Promote Cyber Security Through Obscurity

Carl Mazzanti is the president of eMazzanti Technologies in Hoboken. Is your organization trying to…

1 week ago

What Is Microsoft’s Role in the Shared Responsibility Model for Data Security?

Migrating to the cloud delivers undeniable business benefits. But it also opens the door to…

2 weeks ago

Closing the Door On Global Cyber Threats

Carl Mazzanti is the president of eMazzanti Technologies in Hoboken. One of our clients —…

2 weeks ago

Microsoft Planner vs. Project: 5 Key Differences in 2024

With the new Microsoft Planner joining the Microsoft 365 universe this year, users are taking…

3 weeks ago

Exploring the Benefits of AI Copilots: What Are They and How Do They Work?

In the rapidly evolving technology landscape, artificial intelligence (AI) copilots have emerged as transformative tools…

4 weeks ago