preview

Acceptable Use Policy Template

Better Essays

APPENDIX A: Acceptable Use Security Policy
The following document is a sample Acceptable Use Security Policy using the outline identified in the Security Policy Template. The purpose of this sample document is to aid with the development of your own agency Acceptable Use Security Policy by giving specific examples of what can be performed, stored, accessed and used through the use of your departments computing resources.

Section 1 - Introduction

Information Resources are strategic assets of the and must be treated and managed as valuable resources. provides various computer resources to its employees for the purpose of assisting them in the performance of their job-related duties. State law permits incidental access to state …show more content…

2. Users must report any incidents of possible misuse or violation of this Acceptable Use Policy through the use of documented Misuse Reporting processes associated with the Internet, Intranet, and Email use standards.

3. Users must not attempt to access any data, documents, email correspondence, and programs contained on systems for which they do not have authorization.

4. Systems administrators and authorized users must not divulge remote connection modem phone numbers or other access points to computer resources to anyone without proper authorization.

5. Users must not share their account(s), passwords, Personal Identification Numbers (PIN), Security Tokens (i.e. Smartcard), or similar information or devices used for identification and authorization purposes.

6. Users must not make unauthorized copies of copyrighted or owned software.

7. Users must not use non-standard shareware or freeware software without the appropriate Management approval.

8. Users must not purposely engage in activity that may harass, threaten or abuse others or intentionally access, create, store or transmit material which may deem to be offensive, indecent or obscene, or that is illegal according to local, state or federal law.

9. Users must not engage in activity that may degrade the performance of Information Resources; deprive an authorized user access to resources; obtain extra resources beyond those allocated; or circumvent computer security

Get Access