Está en la página 1de 8

Computer And Internet Usage Form

Company Name Here

SOP # Revision: Effective Date:

Prepared by: Approved by:

Title: COMPUTER AND INTERNET USAGE POLICY Policy:All employees using the Company IT network shall adhere to strict guidelines concerning appropriate use of network resources. Purpose: Scope: To delineate policies and procedures for accessing the Company IT network and/or accessing the Internet through the Company IT network. This policy applies to all personnel with access to Internet and related services through the Company network infrastructure. Internet Related services include all services provided with the TCP/IP protocol, including but not limited to Electronic Mail (e-mail), File Transfer Protocol (FTP), Gopher, and World Wide Web (WWW) access.

Responsibilities: All Company personnel are responsible for knowing and adhering to this usage policy. The IT Security Manager is responsible for enforcing this policy. Definitions: Internet – The international computer network of networks that connect government, academic and business institutions; the Internet (capitalized) refers specifically to the DARPA Internet and the TCP/IP protocols it uses. Intranet – A private network contained within an enterprise; a network within one organization, using Web technologies to share information internally. Procedure: 1.0 ACCEPTABLE USE - COMPUTERS AND INTERNET Access to the Internet is specifically limited to activities in direct support of official Company business.

• In addition to access in support of specific work related duties, the Company Internet connection may be used for educational and research purposes. • If any user has a question of what constitutes acceptable use he/she should check with their supervisor for additional guidance. Management or supervisory personnel shall consult with the Information Services Manager for clarification of these guidelines.

Computer and Internet Usage Policy

Page 1 of 8

pornographic. or sending messages with large file attachments (attachments larger than 0. or any noncompany-related activity. The transmission of e-mail to large groups. use of email distribution lists.0 INAPPROPRIATE USE .Computer And Internet Usage Form Company Name Here 2. defrauding. The use of suggestive. Employees shall not use Company network for personal gain such as selling access of a Company user login ID. These services shall not be used to harass. • Users should ensure that e-mail messages are sent to only those users with a specific need to know. • Computer and Internet Usage Policy Page 2 of 8 .5 Mb) should be avoided. intimidate or otherwise annoy another person. • Company employees shall not use Internet access for interception of network traffic for any purpose other than engaging in authorized network administration. Users shall not attempt to circumvent or subvert security measures on either the Company’s network resources or any other system connected to or accessible through the Internet. For security reasons. vulgar. subject to inspection. recreational. Internet access through the Company network shall not be for or by performing unauthorized work for profit. store such material on Company equipment. or otherwise illegal or unlawful materials • Use of Company e-mail or other messaging services shall be used for the conduct of Company business only. • The Internet shall not be accessed for private. or obscene language is prohibited. Examples of this are the transmission of violent.0 INTERNET AND E-MAIL ETIQUETTE Company employees shall ensure all communication through Company email or messaging services is conducted in a professional manner. • • • The Company’s intranet or Internet connections shall not be used for commercial or political purposes. • Company users shall not make or use illegal copies of copyrighted material. threatening. obscene. • E-mail privacy cannot be guaranteed. therefore.COMPUTERS AND INTERNET Internet access shall not be for any illegal or unlawful purpose. • Company users shall not reveal private or personal information through email or messaging services without clear and specific written approval from management. • 3. or transmit such material over the Company network. messages transmitted through the Company e-mail system or network infrastructure are the property of the Company and are.

state. None. Access to Company network resources shall be revoked for any user identified as a security risk or who has a demonstrated history of security problems. users shall not use other employees’ accounts.. special controls should be established to safeguard the confidentiality and integrity of data passing over public networks (i. 5.5. to use their accounts. • • • Any and all use of IT assets is subject to monitoring by IT Security.e. employee or not. Additional Resources: A.SECURITY Company users who identify or perceive an actual or suspected security problem shall immediately contact the IT Security Manager..5. in accordance with procedure ITSD108 – IT INCIDENT HANDLING.Computer And Internet Usage Form Company Name Here 4.1 (NETWORK CONTROLS) Clause 8. or federal laws while using the Company network shall be subject to loss of network privileges and any other disciplinary actions deemed appropriate.1(c) of this Standard states that “(i)f necessary.” Computer and Internet Usage Policy Page 3 of 8 . possibly including termination and criminal and/or civil prosecution.special controls may also be required to maintain the availability of the network services and computers connected.0 COMPUTER AND INTERNET USAGE .0 COMPUTER AND INTERNET USAGE . • Network users shall not reveal their account passwords to others or allow any other person. CLAUSE 8. ISO 17799:2000 STANDARD – INFORMATION TECHNOLOGY CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT. Similarly. References: A. the Internet) and to protect the connected systems..PENALTIES Any user violating these policies or applicable local.

Computer And Internet Usage Form Company Name Here Revision History: Revision 0 Date 10/25/05 Description of changes Initial Release Requested By Computer and Internet Usage Policy Page 4 of 8 .

or otherwise illegal or unlawful materials Use of Company e-mail or other messaging services shall be used for the conduct of Company business only. or transmit such material over the Company network.0 INAPPROPRIATE USE . or any noncompany-related activity. intimidate or otherwise annoy another person. • Company employees shall not use Internet access for interception of network traffic for any purpose other than engaging in authorized network administration. store such material on Company equipment.COMPUTERS AND INTERNET • Internet access shall not be for any illegal or unlawful purpose. threatening. Internet access through the Company network shall not be for or by performing unauthorized work for profit. • The Company’s intranet or Internet connections shall not be used for commercial or political purposes. • Company users shall not make or use illegal copies of copyrighted material. • If any user has a question of what constitutes acceptable use he/she should check with their supervisor for additional guidance. • Users shall not attempt to circumvent or subvert security measures on either the Company’s network resources or any other system connected to or accessible through the Internet. • Computer and Internet Usage Policy Page 5 of 8 . obscene. 2.COMPUTERS AND INTERNET Access to the Internet is specifically limited to activities in direct support of official Company business. recreational.0 ACCEPTABLE USE . Examples of this are the transmission of violent. defrauding.Computer And Internet Usage Form Company Name Here ITAD107-1 COMPANY COMPUTER AND INTERNET USAGE POLICY Revision # __________ Date __________________ 1. the Company Internet connection may be used for educational and research purposes. pornographic. • • The Internet shall not be accessed for private. • • In addition to access in support of specific work related duties. Employees shall not use Company network for personal gain such as selling access of a Company user login ID. These services shall not be used to harass. Management or supervisory personnel shall consult with the Information Services Manager for clarification of these guidelines.

Computer And Internet Usage Form Company Name Here 3.5 Mb) should be avoided. • • Users should ensure that e-mail messages are sent to only those users with a specific need to know.0 COMPUTER AND INTERNET USAGE . vulgar. subject to inspection. • Company users shall not reveal private or personal information through email or messaging services without clear and specific written approval from management. or federal laws while using the company network shall be subject to loss of network privileges and any other disciplinary actions deemed appropriate. therefore.PENALTIES Any user violating these policies or applicable local. users shall not use other employees’ accounts. possibly including termination and criminal and/or civil prosecution. to use their accounts. state. • 4. The use of suggestive. Similarly.SECURITY • Company users who identify or perceive an actual or suspected security problem shall immediately contact the IT Security Manager. These reflect an agreement of all parties and should be governed and interpreted in accordance with the laws of the State of <State>. The transmission of e-mail to large groups. 5. 6. Computer and Internet Usage Policy Page 6 of 8 . E-mail privacy cannot be guaranteed. messages transmitted through the Company e-mail system or network infrastructure are the property of the Company and are. in accordance with procedure ITSD108 – IT INCIDENT HANDLING. or sending messages with large file attachments (attachments larger than 0. • Network users shall not reveal their account passwords to others or allow any other person.0 INTERNET AND E-MAIL ETIQUETTE Company employees shall ensure all communication through Company email or messaging services is conducted in a professional manner. employee or not. • Access to Company network resources shall be revoked for any user identified as a security risk or who has a demonstrated history of security problems.0 COMPUTER AND INTERNET USAGE . use of email distribution lists. For security reasons. • Any and all use of IT assets is subject to monitoring by IT Security. or obscene language is prohibited.0 COMPUTER AND INTERNET USAGE .CONCLUSION All terms and conditions as stated in this document are applicable to all users of the Company network and the Internet.

network. and Internet use policies.0 USER COMPLIANCE I understand and will abide by the Company computer. User Signature ________________________________ Date ____________ Computer and Internet Usage Policy Page 7 of 8 . Should I commit any violation. I further understand that any violation of this policy is considered unethical and may constitute a criminal offense.Computer And Internet Usage Form Company Name Here 7. my access privileges may be revoked and disciplinary action and/or appropriate legal actions may be taken.

Computer And Internet Usage Form Company Name Here [This page intentionally left blank.] Computer and Internet Usage Policy Page 8 of 8 .