Need Help? Call 1-866-711-5837

Computer Internet Usage Policy Procedure | ITAD107

ITAD107 Computer Internet Usage Policy Procedure

Share this

easily editable in ms wordComputer Internet Usage Policy Procedure

The Computer Internet Usage Policy Procedure delineates procedures for accessing your company’s IT network and/or accessing the Internet through your company’s IT network. The computer and internet use policy template defines acceptable and inappropriate computer and Internet use for diffusion throughout your company.

The Company Internet Usage Policy Procedure applies to all personnel with access to Internet and related services including but not limited to electronic mail (email), File Transfer Protocol (FTP), Gopher, and World Wide Web access. (8 pages, 1571 words)

Access to the Internet is specifically limited to activities in direct support of official company business. In addition to access in support of specific work related duties, the company Internet connection may be used for educational and research purposes. If any user has a question of what constitutes acceptable use he/she should check with their supervisor for additional guidance.

Computer Internet Usage Responsibilities:

All Employees are responsible for knowing and adhering to this usage policy.

The Information Technology Security Manager is responsible for enforcing this policy.

Computer Internet Usage Definitions:

Internet – The international computer network of networks that connect government, academic and business institutions; the Internet (capitalized) refers specifically to the DARPA Internet and the TCP/IP protocols it uses.

Intranet – A private network contained within an enterprise; a network within one organization, using Web technologies to share information internally

Computer Internet Usage Policy ProcedureComputer Internet Usage Policy Procedure Activities

  • Acceptable Use-Computers and Internet
  • Inappropriate Use-Computers and Internet
  • Internet and E-mail Etiquette
  • Computer and Internet Usage-Security
  • Computer and Internet Usage-Penalties

Computer Internet Usage Policy Procedure References

  • ISO 17799:2000 Standard-Information Technology Code of Practice for Information Security Management, Clause 8.2.1 (Network Controls)

Computer Internet Usage Policy Procedure Forms


SKU: ITAD107 Tag: .


Write a review

There are no reviews yet.

This item is included in the following item(s):

The five-manual CFO financial accounting policies and procedures Bundle includes the policies and procedures a CFO or Controller needs to establish internal controls for your core accounting processes. Not only do you save time using these editable Microsoft Word templates, you save 35% off the list price when purchased as a set!

More >>

Easily develop your Computer & IT Policies and Procedures Manual to standardize your IT Operations with editable MS-Word templates. Use best practices to manage IT vendor management, IT security, IT assets, software development, and administration. Download your IT policy manual now.

More >>