Thursday, September 12, 2019

Acceptable Use Policy & Security Audit Assignment

Acceptable Use Policy & Security Audit - Assignment Example The policy has numerous advantages including governing the traffic into the IT resources or data. Such traffic monitoring are often intended towards reducing network congestion and preventing chances performance degradation. The owner of the policy is usually responsible for the users’ behaviors on the computers; therefore, anyone who is not authorized to the network cannot use the same. This notes that anyone accessing such computers without full authority of the owner constitutes to ill behavior to the policy. For instance, using someone’s name to access the resources and changing the access code among others. In other words, private computers cannot be used in such a computer network system. Those who violate AUP are liable to numerous disciplinary actions where each action taken depends on the degree of the offence and the relationship of the offender and the policy owner (Wright, Freedman, and Liu 220). For instance, if the violation is reported in learning institutions, the culprit may lose the institution’s computer privileges as well as facing possible termination, suspension, or expulsion from the institution. In some cases, such violation may lead to jail terms. Wright, Craig, Brian Freedman, and Dale Liu.  The It Regulatory and Standards Compliance Handbook: [how to Survive an Information Systems Audit and Assessments]. Burlington, MA: Syngress Pub, 2008. Internet

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.