Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Acceptable Use Policies

414 views

Published on

Presentation given to advocate other IT firms creating/updaing IT policy for their client

  • Be the first to comment

  • Be the first to like this

Acceptable Use Policies

  1. 1. The Fulcrum GroupAcceptable Use Policies<br />By Steve Meek, CISSP, MCSE, CCNA<br />
  2. 2. Agenda<br />Definition<br />Why companies don’t have policies<br />End Company Benefits<br />Policy Guidelines<br />Why we want to provide to clients<br />Planning policies<br />Resources to help<br />Discussion<br />
  3. 3. Definition<br />a set of rules applied by the owner/manager of a network, website or large computer system that restrict the ways in which the network site or system may be used. <br />AUP documents are written for corporations,[1] businesses, universities,[2] schools,[3] internet service providers,[4] and website owners[5] often to reduce the potential for legal action that may be taken by a user, and often with little prospect of enforcement.<br />
  4. 4. Why companies don’t have policies<br />because hard to develop<br />making people adhere means work<br />communicating policies out<br />getting all departments to accept policies<br />too much work<br />
  5. 5. End Company Benefits<br />Improve user productivity<br />Reduce legal liability<br />Reduce stress on network and systems<br />Set end user expectations<br />
  6. 6. Policy Guidelines<br /><ul><li>Easy to understand and well written
  7. 7. Are communicated concisely
  8. 8. Enforceable
  9. 9. Fair and equitable
  10. 10. Support company objectives</li></li></ul><li>Why we want to provide to clients<br /><ul><li>Standardization
  11. 11. Easier to maintain (lower cost)
  12. 12. Controlling purchasing
  13. 13. Fewer issues by setting boundaries</li></li></ul><li>Planning policies<br />Organize your team<br />Develop your policies <br />Implement your policies<br />Adhere to a communication plan (use of newsletters, posters and email reminders)<br />Maintain policies (ensure they adhere to changing company needs)<br />
  14. 14. Resources to help<br />If bound by compliancy- utilize those rules for policies<br />Some Web Resources<br />http://csrc.nist.gov/publications/PubsSPs.html<br />http://www.sans.org/resources/policies/<br />http://www.scmagazineus.com/The-Five-Critical-Stages-of-Policy-Management/article/30346/<br />http://blogs.techrepublic.com.com/hiner/?p=467<br />http://www.ruskwig.com/security_policies.htm<br />
  15. 15. Cloud<br />
  16. 16. Discussion<br />

×