The Acceptable Use Incident Log Template provides an example register of incidents relating to Acceptable Use violations. DEV104-2 AUP INCIDENT LOG covers date, ID, description, category, and status. Company users who identify or perceive an actual or suspected security problem should immediately contact the company IT Manager for the incident to be logged in Human Resources Incident Log. Users should not reveal account password or allow another person to use their account. Similarly, users should not use the account of another user. Access to company network resources should be revoked for any user identified as a security risk or a demonstrated history of security problems.
Access to the Internet is specifically limited to activities in direct support of official company business or for educational and research purposes. If any user has a question regarding what constitutes “acceptable use” he/she should check with their supervisor for additional guidance. Management or supervisory personnel should consult with the Information Services Manager for clarification of these guidelines. The company Internet access should not be used for any illegal or unlawful purposes. Examples include the transmission of violent, threatening, defrauding, pornographic, obscene, or otherwise illegal or unlawful materials.
There are no reviews yet.
The five-manual CFO financial accounting policies and procedures Bundle includes the policies and procedures a CFO or Controller needs to establish internal controls for your core accounting processes. Not only do you save time using these editable Microsoft Word templates, you save 35% off the list price when purchased as a set!More >>
Easily develop your Human Resources Policies and Procedures Manual for management and an employee handbook with pre-written and fully editable MS-Word HR content encompassing the critical areas of managing employees including payroll, benefits, conduct, job performance, training, and legal compliance requirements. Download yours today.More >>