Categories Topics
Description
Acceptable Use

Overview
An Acceptable Use policy and procedures should be documented that outline the rules and appropriate process that individuals must follow when handling the organization's assets (e.g. information, software, and hardware) and communication.

Guidelines
The organization's sensitive information should be created, stored and managed for business purposes only, using approved equipment or systems. In addition, Acceptable Use policy or procedures should ensure individuals use only authorized electronic communication mechanisms to conduct business (e.g. electronic mail, networks and internet access) and appropriate use of company mobile devices and workstations.

Use of the organization's systems and equipment for personal use (such as internet access) should also be limited and permitted by leader and in accordance with applicable HR policies. Internet usage for non-business purposes should also be considered a privilege and can be revoked at any time.

Prohibited activities

Employees and contractors must never:
  • Send, store, receive or send any files or communication that is illegal, disruptive or offensive to others
  • Download or use unapproved software on company systems
  • Share passwords with others
  • Disclose company data to unauthorized individuals



Topic Category
Acceptable Use
 
News Articles
PornHub visitors hit with malware attack via poisoned adswww.grahamcluley.com10/10/2017
Email Slip-Up Exposes 60,000 Bank Customers’ Account Detailswww.tripwire.com1/10/2017
Travelers beware! That free charging station could hack your phonewww.cnbc.com9/21/2016
Moving towards a more secure websecurity.googleblog.com9/8/2016
Facebook suggests more privacy tips for keeping user accounts securewww.zdnet.com4/3/2015
Out with unwanted ad injectorsgoogleonlinesecurity.blogspot.com3/31/2015
Snooker WPA secrets with this Wi-Fi toolwww.theregister.co.uk1/5/2015
Smarten Up! Everyone Needs to Think About Android Securitysecuritywatch.pcmag.com4/4/2014
BYOD: Why You Better Not Ignore Itsecurityintelligence.com4/1/2014
Hack to School: Beware the open school wi-fiwww.zdnet.com8/19/2013
Google study finds users ignore Chrome security warningswww.theregister.co.uk7/15/2013
Before You Share, Ask Yourself “Is This TMI?”blogs.mcafee.com7/15/2013
State social media privacy laws a mixed bag for businesseswww.computerworld.com5/15/2013
Facebook, attorneys general kick off online safety campaignnews.cnet.com4/15/2013
FUD flies as Raytheon reveals social media analysis toolwww.theregister.co.uk2/11/2013
One-fifth of malicious mobile websites are porn-relatedwww.scmagazine.com2/11/2013
Indian vendors answering BYOD security needswww.zdnet.com2/4/2013
Bank regulatory body proposes social media guidancewww.scmagazine.com1/24/2013
51% of UK networks compromised by BYODwww.infosecurity-magazine.com1/7/2013
Spammers Using Fake YouTube Notifications to Peddle Drugsthreatpost.com12/26/2012
Companies are losing control of their data to the mobile revolutionwww.infosecurity-magazine.com12/12/2012
Major £30m cyberheist pulled off using MOBILE malwarewww.theregister.co.uk12/7/2012
How did European bank malware steal $47 million?www.zdnet.com12/7/2012
Nearly half of IT shops ignore BYODwww.computerworld.com11/29/2012
Taliban official's email blunder leaks 400+ contactswww.theregister.co.uk11/16/2012
Social networking tops enterprise consumerization security concernswww.infosecurity-magazine.com11/8/2012
Cyberheists ‘A Helluva Wake-up Call’ to Small Bizkrebsonsecurity.com11/6/2012
Requesting Sensitive Data Via Google Docs: Phishing Really is That Easythreatpost.com10/18/2012
The Scrap Value of a Hacked PC, Revisitedkrebsonsecurity.com10/15/2012
ID Theft Service Tied to Payday Loan Siteskrebsonsecurity.com9/17/2012
Six in Tokyo slammer after Android smut scamwww.theregister.co.uk6/18/2012
UK Police Fired Over 'Inappropriate' Facebook Behaviorwww.securitynewsdaily.com12/30/2011
Arrest made in Hollywood hacking probewww.bbc.co.uk10/12/2011
Another OS X Trojan imitates Adobe Flash installerreviews.cnet.com9/26/2011
WikiLeaks Tests Feasibility Of Government Data Securitywww.informationweek.com7/28/2011
White Papers
Social Media: Consumer Compliance Risk Management Guidancewww.ffiec.gov1/22/2013
Policies
Acceptable Use Policy