Logo

    aups

    Explore "aups" with insightful episodes like and "Ssn 1 Ep 10: The Problems it Solves" from podcasts like " and "The Cyber Savvy Cafe"" and more!

    Episodes (1)

    Ssn 1 Ep 10: The Problems it Solves

    Ssn 1 Ep 10: The Problems it Solves

    Acceptable Use Policies: The Whys, Whats, and Whatnots

    Why it’s important to have an AUP in place, how it protects you, and how to make one.

     

    Ssn 1 Ep 10

    The Problems It Solves

    Acceptable Use Policy: The Whys, Whats, and Whatnots

     

    Why it’s important to have an AUP in place, how it protects you, and how to make one.

     

    SHOW NOTES:

    An Acceptable Use Policy (AUP) defines how your employees are to use the corporate network and associated technology; what they can and can’t do.

     

    00:28 Why is it important to have an AUP in place?

     

    01:19 What can potentially happen if you don’t have one?

     

    02: 04 What’s in an AUP?

     

    03:45 What kind of policies do you recommend?

     

    06:12 What fallout have you seen that came from not having an AUP in place?

     

    07:50 How Do You Make One?

    • Sample AUPs are available on the internet to use as a starting point.
    • Ask others in your industry what they use, where they got it, or how they designed it.
    • Hire a professional to assist; look for an experienced MSP who includes AUPs in their services

     

    08:32 Any other problems an AUP solves?

     

    09:52 Where do you post an AUP so it’s accessible to your employees?

     

    10:59 How imperative is it to make one now and not put it off?

     

    Additional Notes:

    General Sections in an AUP Can Include:

    • An overall purpose statement: an overview of the reason for the AUP and key takeaways.
    • Definitions: Make sure any confusing terms are clearly defined, and explain any lingo that may be unique to your industry or your company.
    • Scope: To whom and to what situations does the policy apply?
    • Policies: This covers use, access, behavior, and general company policies for each section.
      • Passwords, sharing of passwords, acceptable use of network, authorized use of voice mailbox, premises, personal devices while at work, etc.
    • Personal Use: Are employees allowed to use the network or devices for any personal use; if so, how and when
    • Enforcement: What happens if a policy is violated. Be very clear about the steps that are to be taken, including sanctions or termination of employment.

     

    Your hosts: Rex Nance and Penny O'Halloran of East Atlantic Security, LLC @https://EastAtlanticSecurity.com/

     

    Voiceover Artist: Paul Kadach at www.voices.com

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io