Solved

Where can i find the computer use policy that is about one paragraph long?

Posted on 2008-10-28
1
342 Views
Last Modified: 2010-04-11
in corporations across the country, there is a short computer policy that is well written and to the point. it is used on corporate unchangable wallpaper and in a pop up box just before logging in. it says something like "this computer is property of abc company. it is for business purposes only. . . .       users should have no expectation of privacy." I have been looking for that but am unable to find it. I have seen is on contractor's computers but have not copied it word for word. Is there a way i can get it or a place to find it? All the computer policies i have done searches on are long drawn out legal policies. I am looking for the one that is about 4 sentences long. there are many people who click past it daily. I would like it if it does not breach any company policies to provide.
0
Comment
Question by:geriatricgeek
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 22837862
Example AUP's?
http://www.spamhaus.org/aups.html
http://xinn.org/tos-logon.txt
http://www.sans.org/resources/policies/

And make sure it say's reasonable...
"an employee has no reasonable expectation of privacy in personal files stored on a company-owned computer."
-rich
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question