SlideShare a Scribd company logo
ACCEPTABLE USE POLICY MAKING
CS5102 IT POLICY AND PLANNING
DILUM BANDARA, PHD
Clear Ownership, but Blurred Use
 Organizational IT resources should be used only for the purposes
that they are provided for
 Increasingly organizations are allowing users to use cooperate
resources for personal use & vice versa
 COPE vs. BYOD
 What is acceptable & what’s not are getting blurred
 Organizations should have the right to inspect all data stored on
or communicated via organizational resources without invading
privacy of users 2
Acceptable Use Policy (AUP)
 Defines what’s acceptable & what’s not
 States the purpose why resources are provided
 It sets guidelines as to how computers, network, website, or
system may be used
 It restrict the ways in which those resources may be used
 Defines the consequences of violating the rules of conduct
 Ensure compliance 3
Process
 Initiate & Establish Structure
 Review & Research
 Preparation of Draft Policy
 Circulation & Consultation
 Ratification & Communication
 Implementation
 Monitoring
 Review, Evaluation & Revision 4
Source: www.webwise.ie/teachers/acceptable-use-policy/how-to-
develop-an-acceptable-use-policy-2/
Initiate & Establish Structure
 Define the teams who are responsible for preparation of AUP &
approval of it
 Define policy scope
 Typically developed under the IT Council
 Approved by IT Advisory Board and/or CIO Board
5
Review & Research
 Develop an inventory of computers, network, websites, or
systems may be used
 Consider both in-house & outside resources that users have access to
 Laptops, tablets, smartphones, Wi-Fi, e-Mail, Voice mail, Enterprise social
networking platforms, cooperate accounts
 Identify types personal devices & resources they access/connect
 Determine pros & cons of covering these in UAP or a separate policy such
as BYOD
6
Draft Policy Content
 Establish purposes for providing resources
 Define resources covered under AUP
 Define what is non-business use
 State the right to inspect & monitor
 State what is monitored, how, & under what circumstances
 State restrictions on solicitation
 State relevant laws & consequences of violation
 Contact information for clarifications & feedback
7
Process (Cont.)
 Circulation & Consultation
 Share with stakeholders
 Solicit feedback
 Ratification & Communication
 Obtain approval
 Then communicate to all
stakeholders
 Implementation
 Phased enforcement
 Monitoring
 Regular (automated) checks
 Identify any overlooked issues
 Review, Evaluation & Revision
 Evolve as technology & use
evolve
 Cover missing pieces
8

More Related Content

Similar to Acceptable Use Policy Making

RegEd Social Media Basics Webinar Series - the social media policy
RegEd Social Media Basics Webinar Series - the social media policyRegEd Social Media Basics Webinar Series - the social media policy
RegEd Social Media Basics Webinar Series - the social media policy
Blane Warrene
 
20110310 ARMA Northern CO Strategies and Policies for Social Media
20110310 ARMA Northern CO Strategies and Policies for Social Media20110310 ARMA Northern CO Strategies and Policies for Social Media
20110310 ARMA Northern CO Strategies and Policies for Social Media
Jesse Wilkins
 
Some Proposed Principles for Interoperating Cloud Based Data Platforms
Some Proposed Principles for Interoperating Cloud Based Data PlatformsSome Proposed Principles for Interoperating Cloud Based Data Platforms
Some Proposed Principles for Interoperating Cloud Based Data Platforms
Robert Grossman
 
Extending Access Management into BCE - Scoping Study
Extending Access Management into BCE - Scoping StudyExtending Access Management into BCE - Scoping Study
Extending Access Management into BCE - Scoping Study
JISC BCE
 
EHR Certification for Medical Practices
EHR Certification for Medical PracticesEHR Certification for Medical Practices
EHR Certification for Medical Practices
Michael Duffy
 
Develop project pia+ risk identification
Develop project pia+ risk identificationDevelop project pia+ risk identification
Develop project pia+ risk identification
Trilateral Research
 
To meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, STo meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, S
TakishaPeck109
 
Licensing health data to enable reuse
Licensing health data to enable reuseLicensing health data to enable reuse
Licensing health data to enable reuse
ARDC
 
Ten Elements of Open Source Governance
Ten Elements of Open Source GovernanceTen Elements of Open Source Governance
Ten Elements of Open Source Governance
Rogue Wave Software
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
Accenture Technology
 
Harrisburg UniversityISEM 547 IT PolicyOb.docx
Harrisburg UniversityISEM 547  IT PolicyOb.docxHarrisburg UniversityISEM 547  IT PolicyOb.docx
Harrisburg UniversityISEM 547 IT PolicyOb.docx
shericehewat
 
Provider Directory Task Force 01-04-11
Provider Directory Task Force 01-04-11Provider Directory Task Force 01-04-11
Provider Directory Task Force 01-04-11
Brian Ahier
 
File000169
File000169File000169
File000169
Desmond Devendran
 
PACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other DocumentsPACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other Documents
Pace IT at Edmonds Community College
 
Extending Access Management to Business & Community Engagement - John Paschoud
Extending Access Managementto Business & Community Engagement - John PaschoudExtending Access Managementto Business & Community Engagement - John Paschoud
Extending Access Management to Business & Community Engagement - John Paschoud
Eduserv
 
EHR Certification Requirements For Medical Practices
EHR Certification Requirements For Medical PracticesEHR Certification Requirements For Medical Practices
EHR Certification Requirements For Medical Practices
Michael Patrick
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
TrustArc
 
SharePoint Saturday Redmond - Don't Be Afraid of the "G" Word
SharePoint Saturday Redmond - Don't Be Afraid of the "G" WordSharePoint Saturday Redmond - Don't Be Afraid of the "G" Word
SharePoint Saturday Redmond - Don't Be Afraid of the "G" Word
Melinda Morales
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
Logicalis Australia
 
Social networking and compliance 05 13-10 final
Social networking and compliance 05 13-10 finalSocial networking and compliance 05 13-10 final
Social networking and compliance 05 13-10 final
Deborah Well
 

Similar to Acceptable Use Policy Making (20)

RegEd Social Media Basics Webinar Series - the social media policy
RegEd Social Media Basics Webinar Series - the social media policyRegEd Social Media Basics Webinar Series - the social media policy
RegEd Social Media Basics Webinar Series - the social media policy
 
20110310 ARMA Northern CO Strategies and Policies for Social Media
20110310 ARMA Northern CO Strategies and Policies for Social Media20110310 ARMA Northern CO Strategies and Policies for Social Media
20110310 ARMA Northern CO Strategies and Policies for Social Media
 
Some Proposed Principles for Interoperating Cloud Based Data Platforms
Some Proposed Principles for Interoperating Cloud Based Data PlatformsSome Proposed Principles for Interoperating Cloud Based Data Platforms
Some Proposed Principles for Interoperating Cloud Based Data Platforms
 
Extending Access Management into BCE - Scoping Study
Extending Access Management into BCE - Scoping StudyExtending Access Management into BCE - Scoping Study
Extending Access Management into BCE - Scoping Study
 
EHR Certification for Medical Practices
EHR Certification for Medical PracticesEHR Certification for Medical Practices
EHR Certification for Medical Practices
 
Develop project pia+ risk identification
Develop project pia+ risk identificationDevelop project pia+ risk identification
Develop project pia+ risk identification
 
To meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, STo meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, S
 
Licensing health data to enable reuse
Licensing health data to enable reuseLicensing health data to enable reuse
Licensing health data to enable reuse
 
Ten Elements of Open Source Governance
Ten Elements of Open Source GovernanceTen Elements of Open Source Governance
Ten Elements of Open Source Governance
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
 
Harrisburg UniversityISEM 547 IT PolicyOb.docx
Harrisburg UniversityISEM 547  IT PolicyOb.docxHarrisburg UniversityISEM 547  IT PolicyOb.docx
Harrisburg UniversityISEM 547 IT PolicyOb.docx
 
Provider Directory Task Force 01-04-11
Provider Directory Task Force 01-04-11Provider Directory Task Force 01-04-11
Provider Directory Task Force 01-04-11
 
File000169
File000169File000169
File000169
 
PACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other DocumentsPACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other Documents
 
Extending Access Management to Business & Community Engagement - John Paschoud
Extending Access Managementto Business & Community Engagement - John PaschoudExtending Access Managementto Business & Community Engagement - John Paschoud
Extending Access Management to Business & Community Engagement - John Paschoud
 
EHR Certification Requirements For Medical Practices
EHR Certification Requirements For Medical PracticesEHR Certification Requirements For Medical Practices
EHR Certification Requirements For Medical Practices
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
 
SharePoint Saturday Redmond - Don't Be Afraid of the "G" Word
SharePoint Saturday Redmond - Don't Be Afraid of the "G" WordSharePoint Saturday Redmond - Don't Be Afraid of the "G" Word
SharePoint Saturday Redmond - Don't Be Afraid of the "G" Word
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
Social networking and compliance 05 13-10 final
Social networking and compliance 05 13-10 finalSocial networking and compliance 05 13-10 final
Social networking and compliance 05 13-10 final
 

More from Dilum Bandara

Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
Dilum Bandara
 
Time Series Analysis and Forecasting in Practice
Time Series Analysis and Forecasting in PracticeTime Series Analysis and Forecasting in Practice
Time Series Analysis and Forecasting in Practice
Dilum Bandara
 
Introduction to Dimension Reduction with PCA
Introduction to Dimension Reduction with PCAIntroduction to Dimension Reduction with PCA
Introduction to Dimension Reduction with PCA
Dilum Bandara
 
Introduction to Descriptive & Predictive Analytics
Introduction to Descriptive & Predictive AnalyticsIntroduction to Descriptive & Predictive Analytics
Introduction to Descriptive & Predictive Analytics
Dilum Bandara
 
Introduction to Concurrent Data Structures
Introduction to Concurrent Data StructuresIntroduction to Concurrent Data Structures
Introduction to Concurrent Data Structures
Dilum Bandara
 
Hard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Hard to Paralelize Problems: Matrix-Vector and Matrix-MatrixHard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Hard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Dilum Bandara
 
Introduction to Map-Reduce Programming with Hadoop
Introduction to Map-Reduce Programming with HadoopIntroduction to Map-Reduce Programming with Hadoop
Introduction to Map-Reduce Programming with Hadoop
Dilum Bandara
 
Embarrassingly/Delightfully Parallel Problems
Embarrassingly/Delightfully Parallel ProblemsEmbarrassingly/Delightfully Parallel Problems
Embarrassingly/Delightfully Parallel Problems
Dilum Bandara
 
Introduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale ComputersIntroduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale Computers
Dilum Bandara
 
Introduction to Thread Level Parallelism
Introduction to Thread Level ParallelismIntroduction to Thread Level Parallelism
Introduction to Thread Level Parallelism
Dilum Bandara
 
CPU Memory Hierarchy and Caching Techniques
CPU Memory Hierarchy and Caching TechniquesCPU Memory Hierarchy and Caching Techniques
CPU Memory Hierarchy and Caching Techniques
Dilum Bandara
 
Data-Level Parallelism in Microprocessors
Data-Level Parallelism in MicroprocessorsData-Level Parallelism in Microprocessors
Data-Level Parallelism in Microprocessors
Dilum Bandara
 
Instruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Hardware TechniquesInstruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Hardware Techniques
Dilum Bandara
 
Instruction Level Parallelism – Compiler Techniques
Instruction Level Parallelism – Compiler TechniquesInstruction Level Parallelism – Compiler Techniques
Instruction Level Parallelism – Compiler Techniques
Dilum Bandara
 
CPU Pipelining and Hazards - An Introduction
CPU Pipelining and Hazards - An IntroductionCPU Pipelining and Hazards - An Introduction
CPU Pipelining and Hazards - An Introduction
Dilum Bandara
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Dilum Bandara
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCP
Dilum Bandara
 
Introduction to Content Delivery Networks
Introduction to Content Delivery NetworksIntroduction to Content Delivery Networks
Introduction to Content Delivery Networks
Dilum Bandara
 
Peer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and StreamingPeer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and Streaming
Dilum Bandara
 
Mobile Services
Mobile ServicesMobile Services
Mobile Services
Dilum Bandara
 

More from Dilum Bandara (20)

Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
Time Series Analysis and Forecasting in Practice
Time Series Analysis and Forecasting in PracticeTime Series Analysis and Forecasting in Practice
Time Series Analysis and Forecasting in Practice
 
Introduction to Dimension Reduction with PCA
Introduction to Dimension Reduction with PCAIntroduction to Dimension Reduction with PCA
Introduction to Dimension Reduction with PCA
 
Introduction to Descriptive & Predictive Analytics
Introduction to Descriptive & Predictive AnalyticsIntroduction to Descriptive & Predictive Analytics
Introduction to Descriptive & Predictive Analytics
 
Introduction to Concurrent Data Structures
Introduction to Concurrent Data StructuresIntroduction to Concurrent Data Structures
Introduction to Concurrent Data Structures
 
Hard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Hard to Paralelize Problems: Matrix-Vector and Matrix-MatrixHard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Hard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
 
Introduction to Map-Reduce Programming with Hadoop
Introduction to Map-Reduce Programming with HadoopIntroduction to Map-Reduce Programming with Hadoop
Introduction to Map-Reduce Programming with Hadoop
 
Embarrassingly/Delightfully Parallel Problems
Embarrassingly/Delightfully Parallel ProblemsEmbarrassingly/Delightfully Parallel Problems
Embarrassingly/Delightfully Parallel Problems
 
Introduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale ComputersIntroduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale Computers
 
Introduction to Thread Level Parallelism
Introduction to Thread Level ParallelismIntroduction to Thread Level Parallelism
Introduction to Thread Level Parallelism
 
CPU Memory Hierarchy and Caching Techniques
CPU Memory Hierarchy and Caching TechniquesCPU Memory Hierarchy and Caching Techniques
CPU Memory Hierarchy and Caching Techniques
 
Data-Level Parallelism in Microprocessors
Data-Level Parallelism in MicroprocessorsData-Level Parallelism in Microprocessors
Data-Level Parallelism in Microprocessors
 
Instruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Hardware TechniquesInstruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Hardware Techniques
 
Instruction Level Parallelism – Compiler Techniques
Instruction Level Parallelism – Compiler TechniquesInstruction Level Parallelism – Compiler Techniques
Instruction Level Parallelism – Compiler Techniques
 
CPU Pipelining and Hazards - An Introduction
CPU Pipelining and Hazards - An IntroductionCPU Pipelining and Hazards - An Introduction
CPU Pipelining and Hazards - An Introduction
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCP
 
Introduction to Content Delivery Networks
Introduction to Content Delivery NetworksIntroduction to Content Delivery Networks
Introduction to Content Delivery Networks
 
Peer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and StreamingPeer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and Streaming
 
Mobile Services
Mobile ServicesMobile Services
Mobile Services
 

Recently uploaded

[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 

Recently uploaded (20)

[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 

Acceptable Use Policy Making

  • 1. ACCEPTABLE USE POLICY MAKING CS5102 IT POLICY AND PLANNING DILUM BANDARA, PHD
  • 2. Clear Ownership, but Blurred Use  Organizational IT resources should be used only for the purposes that they are provided for  Increasingly organizations are allowing users to use cooperate resources for personal use & vice versa  COPE vs. BYOD  What is acceptable & what’s not are getting blurred  Organizations should have the right to inspect all data stored on or communicated via organizational resources without invading privacy of users 2
  • 3. Acceptable Use Policy (AUP)  Defines what’s acceptable & what’s not  States the purpose why resources are provided  It sets guidelines as to how computers, network, website, or system may be used  It restrict the ways in which those resources may be used  Defines the consequences of violating the rules of conduct  Ensure compliance 3
  • 4. Process  Initiate & Establish Structure  Review & Research  Preparation of Draft Policy  Circulation & Consultation  Ratification & Communication  Implementation  Monitoring  Review, Evaluation & Revision 4 Source: www.webwise.ie/teachers/acceptable-use-policy/how-to- develop-an-acceptable-use-policy-2/
  • 5. Initiate & Establish Structure  Define the teams who are responsible for preparation of AUP & approval of it  Define policy scope  Typically developed under the IT Council  Approved by IT Advisory Board and/or CIO Board 5
  • 6. Review & Research  Develop an inventory of computers, network, websites, or systems may be used  Consider both in-house & outside resources that users have access to  Laptops, tablets, smartphones, Wi-Fi, e-Mail, Voice mail, Enterprise social networking platforms, cooperate accounts  Identify types personal devices & resources they access/connect  Determine pros & cons of covering these in UAP or a separate policy such as BYOD 6
  • 7. Draft Policy Content  Establish purposes for providing resources  Define resources covered under AUP  Define what is non-business use  State the right to inspect & monitor  State what is monitored, how, & under what circumstances  State restrictions on solicitation  State relevant laws & consequences of violation  Contact information for clarifications & feedback 7
  • 8. Process (Cont.)  Circulation & Consultation  Share with stakeholders  Solicit feedback  Ratification & Communication  Obtain approval  Then communicate to all stakeholders  Implementation  Phased enforcement  Monitoring  Regular (automated) checks  Identify any overlooked issues  Review, Evaluation & Revision  Evolve as technology & use evolve  Cover missing pieces 8

Editor's Notes

  1. Restrictions on solicitation – No political campaigns, fund raising