What is acceptable use policy (AUP)? – Definition from WhatIs.com – TechTarget

Random topic

An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources. Many businesses and educational institutions require employees or students to sign an AUP before being granted a network ID.
From an information technology (IT) perspective, an AUP states what a user can and cannot do when using computers and computing resources. This applies whether the organization provides the device or it is a personal device that the user provides.
One of the benefits of an AUP is that it spells out acceptable and unacceptable employee behavior and actions. AUPs also provide a company with a legal mechanism to compel compliance, and they describe penalties for noncompliance.
Internet service providers (ISPs) usually require new customers to sign an AUP. It may be part of a service level agreement (SLA) between the ISP and customer.
The following are nine stipulations that might be included in an ISP’s acceptable use policy:
A disclaimer is often included in an AUP absolving the organization from responsibility for a data breach, malware or other issue. Statements about when a person is in violation of this policy and when law enforcement might be called in could also be included.
The following are examples of areas where an acceptable use policy could be helpful:
Signing an acceptable use policy may be required as part of an employment contract. It often happens during the employee onboarding process or as needed with existing employees.
However, employees must be reminded periodically of their responsibility to understand and adhere to the rules spelled out in the AUP. Some best practices that help employees comply with these policies include the following:
BYOD acceptable use policies are becoming common. Find out more about BYOD policy enforcement and creation.
Adversarial machine learning is a technique used in machine learning to fool or misguide a model with malicious input.
Data center interconnect (DCI) technology links two or more data centers together to share resources.
Routing Information Protocol (RIP) is a distance vector protocol that uses hop count as its primary metric.
Network availability is the amount of uptime in a network system over a specific time interval.
GPS jamming is the act of using a frequency transmitting device to block or interfere with radio communications.
A checksum is a value that represents the number of bits in a transmission message and is used by IT professionals to detect …
Security information and event management (SIEM) is an approach to security management that combines security information …
FMEA (failure mode and effects analysis) is a step-by-step approach for collecting knowledge about possible points of failure in …
A proof of concept (POC) is an exercise in which work is focused on determining whether an idea can be turned into a reality.
Green IT (green information technology) is the practice of creating and using environmentally sustainable computing.
Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related …
A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (…
Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business …
The law of diminishing returns is an economic principle stating that as investment in a particular area increases, the rate of …
Customer engagement is the means by which a company creates a relationship with its customer base to foster brand loyalty and …
Direct email marketing is a format for email-based campaigns in which standalone advertisements are sent to a targeted list of …
All Rights Reserved, Copyright 1999 – 2022, TechTarget

Privacy Policy
Cookie Preferences
Do Not Sell or Share My Personal Information


Leave a Reply

Your email address will not be published. Required fields are marked *