Solved

Where can i find the computer use policy that is about one paragraph long?

Posted on 2008-10-28
1
321 Views
Last Modified: 2010-04-11
in corporations across the country, there is a short computer policy that is well written and to the point. it is used on corporate unchangable wallpaper and in a pop up box just before logging in. it says something like "this computer is property of abc company. it is for business purposes only. . . .       users should have no expectation of privacy." I have been looking for that but am unable to find it. I have seen is on contractor's computers but have not copied it word for word. Is there a way i can get it or a place to find it? All the computer policies i have done searches on are long drawn out legal policies. I am looking for the one that is about 4 sentences long. there are many people who click past it daily. I would like it if it does not breach any company policies to provide.
0
Comment
Question by:geriatricgeek
1 Comment
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
Comment Utility
Example AUP's?
http://www.spamhaus.org/aups.html
http://xinn.org/tos-logon.txt
http://www.sans.org/resources/policies/

And make sure it say's reasonable...
"an employee has no reasonable expectation of privacy in personal files stored on a company-owned computer."
-rich
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now