Using the Internet in an Acceptable Way

If your organisation's Information Security Policies do not explicitly state what is deemed acceptable, it may be hard, or impossible to invoke any form of disciplinary action against those involved. Your Information Security Policy must be clear about this.

To view the related Policy click      

  • The following examples of Internet access not only detract from business efficiency, some can even result in legal and criminal proceedings, which will almost certainly damage the organisation.
  1. Downloading of pornographic material from Web sites
  2. Playing games and using 'Chat Rooms'.
  3. Subscribing and contributing to News Groups using the corporate Internet address and signature.
  4. Sending and receiving personal correspondence by e-mail, the volume and content of which is deemed as excessive and / or inappropriate.
  5. Excessive 'surfing' of Web sites during business hours for personal reasons.
  6. Retrieval and distribution to other staff of offensive 'joke of the day' e-mails .
  7. The use and abusive of office equipment for the storage and printing of inappropriate material e.g. large pictures / images.

  • Ensure that staff are aware of the Policy relating to Acceptable Internet Use.
  • Enforce the policy by using appropriate technology tools which restrict access only to those selected web sites and connections which are considered relevant to business activity. Caution! See Respecting Privacy in the Workplace.
  • Consider applying disciplinary procedures as appropriate. Caution! See Respecting Privacy in the Workplace.
Previous PageTop of this pageNext Page


Information Security Policies from US$595

 From
 US$595

Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word

 

Next PageUpPrevious Page