How Can I creat regulations of using computer in the government ?

Posted on 2004-10-26
Last Modified: 2010-04-10
Hi all experts , the manager tell me to creat a national standards of using the computers in the offices of some the  governmet  (how do the employees do in thier offices by using computers and network like , what is the acceptable policy or ethics if  the employee take the computer to home? and if he damage the hardware in the work ?) (code of ethics)

I know security policy that be downloadable from

but couldn't find any references of my needing

I need to this with certefied national refrences from  . plz
Question by:nader alkahtani
    LVL 4

    Accepted Solution

    I think you are asking for a template of an "Acceptable Usage Policy" (AUP)? A document that defines what the "acceptable usage" of corporate resources (computers, networks, printers, email, etceteras)?  And then I think you said you want a governmental version?

    so, here is a very brief definition of what an AUP is:

    here is the one that the United States Department of the Interior uses to define acceptable usage of the Internet:

    and this one defines the AUP for phones and such:

    I hope this helps somewhat

    LVL 7

    Assisted Solution

    At the NIST site (National Institute of Standards and Technology) you will find:
    Computer Security Resource Center
    Federal Requirements
    LVL 18

    Assisted Solution

    Here is the internet usage policy for all state employees for Virginia:

    Here are the policies for the University of Virginia employees:

    I just recently wrote the IT policy for my department.
    LVL 4

    Expert Comment

    Just a note:  I was looking at some of the links the others provided, and I tried the State of Virginia AUP for the Internet.  Avoid that one.  IMHO, it's poorly written (If I had turned in work like that my boss would have canned my butt :)).  I'm referring to:


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Some time ago I was asked to set up a web portal PC to put at our entrance. When customers arrive, they could see a webpage 'promoting' our company. So I tried to set up a windows 7 PC as a kiosk PC.......... I will spare you all the annoyances I…
    Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

    884 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    20 Experts available now in Live!

    Get 1:1 Help Now