The Acceptable Use Incident Log Template provides an example register of incidents relating to Acceptable Use violations. DEV104-2 AUP INCIDENT LOG covers date, ID, description, category, and status. Company users who identify or perceive an actual or suspected security problem should immediately contact the company IT Manager for the incident to be logged in Human Resources Incident Log. Users should not reveal account password or allow another person to use their account. Similarly, users should not use the account of another user. Access to company network resources should be revoked for any user identified as a security risk or a demonstrated history of security problems.
Access to the Internet is specifically limited to activities in direct support of official company business or for educational and research purposes. If any user has a question regarding what constitutes “acceptable use” he/she should check with their supervisor for additional guidance. Management or supervisory personnel should consult with the Information Services Manager for clarification of these guidelines. The company Internet access should not be used for any illegal or unlawful purposes. Examples include the transmission of violent, threatening, defrauding, pornographic, obscene, or otherwise illegal or unlawful materials.
There are no reviews yet.