Upload
homer-dalton
View
218
Download
0
Tags:
Embed Size (px)
Citation preview
INTERNET SAFETY
What is an Acceptable Use Policy?Acceptable Use Policy (AUP)
Code of Conduct for Internet Use
Used by Organizations and Businesses
Outlines agreement in writing
Document signed by employee/participant and the governing organization or business
What’s Included in Policy?Identifies owner of computers/network
Defines intended use
Identifies unacceptable use
Notes consequences
Requires signature of acceptance
Why Have a Policy?Protect the company or organization
Protect the employee (or computer user)
Maintains security
Laws Governing Internet UseCopyright laws
Child protection laws
Privacy rights and safety
National security
Laws continue to evolve and change!
Unacceptable BehaviorVisiting sites that contain obscene, hateful or otherwise
illegal material
Using the computer to perpetrate any form of fraud or music piracy
Using the Internet to send offensive or harassing material
to other users
Hacking into unauthorized areas
Publishing defamatory and/or knowingly false material about your company, colleagues and/or customers on social networking sites, blogs
Unacceptable Behavior
Revealing confidential information about your company in a personal online posting, upload or transmission (financial information or information relating to customers, business plans, policies, staff and/or internal discussions)
Undertaking deliberate activities that waste staff effort or networked resources
Introducing any form of malicious software into the corporate network
AUP Consequences
Chevron Corp. settled out of court—paying US $2.2 million—after the company was sued because of an e-mail circulated within the company containing offensive material.
Microsoft Corp. settled for US $2.2 million a sexual harassment suit involving inappropriate e-mails sent within the company.
http://www.isaca.org/Journal/archives/2005/Volume-6/Pages/Best-Practices-for-Establishing-an-Effective-Workplace-Policy-for-Acceptable-Computer-Usage1.aspx
AUP Consequences
Xerox fired more than 40 employees for downloading inappropriate images. These downloads choked Xerox's computer system and prevented employees from sending and receiving legitimate e-mails.
Wachovia Securities fired six brokers for sending inappropriate images in e-mails.
http://www.isaca.org/Journal/archives/2005/Volume-6/Pages/Best-Practices-for-Establishing-an-Effective-Workplace-Policy-for-Acceptable-Computer-Usage1.aspx
LCPS Acceptable UseStudents and parents agree by signing
the Student R&R page and turning in first week of school each year.
Always read the documents before you sign them!
Review LCPS Policy and Classroom Policy as a class.
LCPS Acceptable UseThis computer system is the property of Loudoun County Public Schools. Unauthorized access to
this computer system is forbidden. Users (authorized or unauthorized) have no explicit or
implicit expectations of privacy. By accessing this computer system, you voluntarily consent to all
LCPS’s policies and regulations and you voluntarily consent to having your actions, emails
or other electronic information monitored, recorded, seized and disclosed to authorized
personnel as determined by LCPS.
Class AssignmentAfter class discussion and reviewing the LCPS and
BWHS Marketing AUP’s – the students will work with a partner to demonstrate their knowledge and understanding of Internet Safety/Acceptable Use Policy in the workplace and in the classroom.
Cover slide, Agenda slide, 4 content slides, conclusion slide
[email protected] DO:Students will create a PowerPoint to share with the class that
depicts:1. Importance of having an Acceptable Use Policy (AUP)2. Identify 3 ways you can violate an AUP (i.e.
unacceptable behavior)3. What can happen if you violate the AUP in your
Marketing class4. Identify 2 risks of posting personal and work
information on the Internet (i.e. on social networking sites, job search sites)