Employee it Acceptable Use Policy Research Paper

Download this Research Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Research Paper:

Acceptable Use Policy at Cincom Systems

Policy for Cincom Systems

Cincom Systems' customers are the foundation of our success. This acceptable IT use policy statement is designed to provide our employees with the agility and flexibility to meet customer needs with accuracy and speed, while also protecting our IT systems, data, and records. This document defines the baseline of expectations for Cincom employees in interacting with all Cincom computing systems, platforms, Virtual Private Network (VPN) connections and partner sites as well. Every employee is expected at a minimum to ensure their activities on all Cincom IT systems don't jeopardize the confidentiality of customer data, financial data generated from Cincom operations, product and project development plans, and costing data of projects. As Cincom engages in confidential projects with governments globally in addition to the U.S. Department of Defense, any employee using data on these projects are required to have a valid DoD clearance in good standing. As Cincom's business is heavily dependent on these projects it is expected that employees will take every possible action to protect the sensitivity and privacy of all information and data sources within the Cincom IT systems. Employees with security clearances are expected to abide by all guidelines of the use of confidential government data on projects. This includes abiding by all vault processes and procedures for confidential government data, across all national ministries of defense served on Cincom projects. Employees are also expected to use Cincom IT systems during business hours for company work only; Internet use for personal activities needs to be completed off the premises given the highly secured nature of the Cincom IT system architecture and platform. Employees who fail to abide by these guidelines or willingly violate them will be subject to immediate dismissal and possible disciplinary actions. If government data from the U.S. Or other nations are compromised, Cincom and the governments whose data has been compromised will engage in legal proceeding to retrieve and protect all assets, in addition to holding a formal investigation of the activities that led to the breach.


The purpose of this IT Acceptable Use Policy is to provide guidelines to Cincom employees who rely on the many systems, applications and data files in the fulfillment of their daily activities. As Cincom has led the transformation of many businesses to bring the power of their mainframes to the desktop, there is the corresponding responsibility of our employees to manage data intelligently and securely on their desktop systems as well. Cincom employees are required to protect all Cincom IT equipment, operating systems, software of all types including data and analysis completed. As Cincom relies on government projects across many different nations, interacting with their departments and ministries of defense, employees are required to sign an agreement to protect information assets, data, analysis and any intellectual property generated on behalf of customers globally. This will be protected through Federal and State statues that also extend to intellectual property and all form of data that resides on Cincom IT systems, networks and platforms globally. Cincom reserves the right to audit any system, network or data use profile at any time to ensure the security of customers globally.


All Cincom IT systems must be specifically used only for customer-based projects and completion of support and serving software coding and development. Employees have no expectation of privacy when using Cincom IT systems, and this includes personal use of the systems as well. Cincom reserves the right to audit all activity, inspect all systems, and also review the contents of computer files, electronic mailboxes, computer and WebEx conferencing systems, in addition to auditing all printed output bot through printer monitoring and actual hardcopy output.

Cincom reserves the right to initiate these audits based on the following activities becoming apparent through network and security analysis:

1. When it is considered necessary to protect the security, research and programming outcomes of the company, and integrity of computing resources.

2. When there is justifiable cause to believe that a policy has been violated or system been used for illegal, unethical or immoral activities.

3. When analysis of computing resources shows unusual or excessively large amounts of download activity on a given account, including significant upload activity of large amounts of data.

4. When the integrity of the computing architecture is potentially compromised through the use of unsecured devices across VPN connections not designed for security by Cincom IT security technicians and staff.

Part II: Ethical, Legal, and Moral Implications of the Policy

The ethical, moral and legal implications of the Cincom IT policy are designed to protect the confidentiality of customer data globally while also setting the foundation for support of a geographically-dispersed workforce. The ethical implications of corporate use policies increasingly need to put responsibility for compliance back to the employee given the highly distributed nature of IT systems today (Siau, Nah, Teng, 2002). Cincom has done this both from an ethical and legal standpoint. The foundation of any effective IT Acceptable Use Policy is making compliance a personal responsibility of each employee (Welebir, Kleiner, 2005). This is precisely what Cincom has done. By concentrating on the ethical aspects of their IT Acceptable Use Policy, Cincom holds the employee ethically responsible for staying in compliance.

The moral aspects of their acceptable use policy are not as clear, as they openly state all activity can and will most likely be monitored given their close associated with governments globally. Compounding this moral dilemma for Cincom is the fact they are handling massive amounts of confidential data. The moral aspects of monitoring every personal interaction through their systems is, according to the guidelines, covered by their right to manage their IT systems and assets as they see fit. The morality of looking into each And every interchange (which Cincom has the technology to do) raises the issue of employee privacy. Cincom has made it clear from a moral standpoint they have the right to 100% of all activity on their systems. Employees are given this acceptable use policy when they first start working for the company. Cincom is setting the foundation of their moral stance on IT use by taking these steps to clearly define expectations early on. The use of acceptable use policies is critically important for establishing a moral and legal precedent to protect company assets over the long-term (Martin, 2009). From an ethical standpoint Cincom has defined a very clear set of boundaries for employees to adhere to and abide by, setting the foundation for strong legal precedents as well (Lichtenstein, Swatman, 1997).

The legal implications of the Cincom IT Acceptable Use IT Policy are clear. While many companies have taken a more relaxed approach to defining Internet access, this can often result in a myriad of potential legal threats to their core business (Hickins, 1999). As Cincom is heavily involved in government contracting and subcontracting with national defense ministries and departments of defense globally, the no-access approach to personal use of the Internet is a legally prudent move for the company to make. The potential for the authorized use and distribution of protected information is going to be significantly minimized by this decision. The legal precedent of now allowing for personal use of the Internet is very defensible, even in telework configurations and scenarios (Joice, Verive, 2006). Cincom's various departments have often discounted and complained about this move, yet it is clear that for the legal protection of the company and its customer relationships long-term this is critical to their success. The result has been impressive: not a single breach of customer data has ever been experienced by the company over four decades of working with international governments and the U.S. Department of Defense.

Appendix A: Description of Cincom Systems

Cincom Systems is a leading provider of enterprise…[continue]

Cite This Research Paper:

"Employee It Acceptable Use Policy" (2012, October 18) Retrieved November 28, 2016, from http://www.paperdue.com/essay/employee-it-acceptable-use-policy-76025

"Employee It Acceptable Use Policy" 18 October 2012. Web.28 November. 2016. <http://www.paperdue.com/essay/employee-it-acceptable-use-policy-76025>

"Employee It Acceptable Use Policy", 18 October 2012, Accessed.28 November. 2016, http://www.paperdue.com/essay/employee-it-acceptable-use-policy-76025

Other Documents Pertaining To This Topic

  • Acceptable Use Policy for the Fire Department

    Acceptable Use Policy for the Fire Department Designing, Developing, Implementing Acceptable Use Policy (AUP) Computers integral part fabric daily life fire service. Once a luxury, computer a necessity a multitude functions: computer aided dispatch, fire incident reporting, creating work schedules, outlining Purpose of the Acceptable Use Policy The fire department owns and operates the computing systems that are provided for use by the employees, fire men and women. The computing systems support the

  • Acceptable Use Policy Aup Policy Review Los

    Acceptable Use Policy AUP Policy Review: Los Angeles Unified School District With continuously evolving technologies, it is important for organizations to set up standards that helps mitigate potential liability in regards to staff potentially of using or misusing such technologies. It is obvious that an Acceptable Use Policy (AUP) is a very important policy within modern organizations in order to define what acceptable employee behavior when accessing company resources is. AUP's help

  • Employee Acceptable Use Policy

    Acceptable Use Policy Employee Acceptable Use Policy E-mail Policies and Procedures INSTANT MESSAGING Instant Messaging Policies and Procedures NETWORK AND INTERNET Personal Responsibility Permitted Use and Term Availability and Access Content and Communications Privacy Downloaded Files Confidential Information Prohibited Activities / Prohibited Uses Compliance Noncompliance SOFTWARE USAGE Software Usage Policies and Procedures ACKNOWLEDGEMENT OF UNDERSTANDING Acknowledgement of Receipt and Understanding (Spectorsoft, 2005, pp. 3-8). ELECTRONIC ACCESS POLICY The Company provides some, if not all, employees with electronic access, consisting of an e-mail system, a network connection, and Internet/Intranet access. This policy

  • Use of Content Filters on Internet in High School

    Internet has grown exponentially since its first introduction to the public. The precursor to the Internet was the ARPANET. The Advanced Research Projects Agency (ARPA) of the Department of Defense (Carlitz and Zinga, 1997) and the National Science Foundation (NSF) were the primary creators of the ARPANET. Subsequently however, efforts from private entities and universities have helped develop the network infrastructure, as it exists today. "The goals of ARPA's

  • Employee Health and Safety Complacency

    Similarly, employers may take advantage of this lack and not inform workers of their right to knowledge of the company's policies and procedures regarding safety features. It is also possible that individuals, particularly those working on a temporary contract basis, are afraid to be replaced when they raise health and safety concerns. Therefore these individuals prefer to take the risk for the sake of the income generated. In the beach environment

  • Employees Accepting Expensive Gifts

    Employees Accepting Gifts The objective of this paper is to analyze the impact of the practice of employees accepting gifts in organizations. Accepting gifts has been a major controversial issue because of the different perceptions among different sections connected with the organization. It is recognized that the line between gift and bribe in the organizational context is almost invisible. This paper attempts to highlight and understand the perceptions of employers, customers,

  • Employee Handbook Privacy Section ABC Widget Company

    Employee Handbook Privacy Section ABC Widget Company: Employee Handbook Privacy Section What privacy rights issues should be addressed? In the Age of Information, there are increasing concerns being voiced about what can legitimately be expected to be kept private, and how these issues affect employees' rights in the workplace. According to Hayden, Hendricks and Novak (1990, most adults spend approximately one-half of their waking hours in the workplace today, and it is therefore

Read Full Research Paper
Copyright 2016 . All Rights Reserved