Employee It Acceptable Use Policy Research Paper

¶ … Acceptable Use Policy at Cincom Systems Policy for Cincom Systems

Cincom Systems' customers are the foundation of our success. This acceptable IT use policy statement is designed to provide our employees with the agility and flexibility to meet customer needs with accuracy and speed, while also protecting our IT systems, data, and records. This document defines the baseline of expectations for Cincom employees in interacting with all Cincom computing systems, platforms, Virtual Private Network (VPN) connections and partner sites as well. Every employee is expected at a minimum to ensure their activities on all Cincom IT systems don't jeopardize the confidentiality of customer data, financial data generated from Cincom operations, product and project development plans, and costing data of projects. As Cincom engages in confidential projects with governments globally in addition to the U.S. Department of Defense, any employee using data on these projects are required to have a valid DoD clearance in good standing. As Cincom's business is heavily dependent on these projects it is expected that employees will take every possible action to protect the sensitivity and privacy of all information and data sources within the Cincom IT systems. Employees with security clearances are expected to abide by all guidelines of the use of confidential government data on projects. This includes abiding by all vault processes and procedures for confidential government data, across all national ministries of defense served on Cincom projects. Employees are also expected to use Cincom IT systems during business hours for company work only; Internet use for personal activities needs to be completed off the premises given the highly secured nature of the Cincom IT system architecture and platform. Employees who fail to abide by these guidelines or willingly violate them will be subject to immediate dismissal and possible disciplinary actions. If government data from the U.S. Or other nations are compromised, Cincom and the governments whose data has been compromised will engage in legal proceeding to retrieve and protect all assets, in addition to holding a formal investigation of the activities that led to the breach.

Purpose

The purpose of this IT Acceptable Use Policy is to provide guidelines to Cincom employees who rely on the many systems, applications and data files in the fulfillment of their daily activities. As Cincom has led the transformation of many businesses to bring the power of their mainframes to the desktop, there is the corresponding responsibility of our employees to manage data intelligently and securely on their desktop systems as well. Cincom employees are required to protect all Cincom IT equipment, operating systems, software of all types including data and analysis completed. As Cincom relies on government projects across many different nations, interacting with their departments and ministries of defense, employees are required to sign an agreement to protect information assets, data, analysis and any intellectual property generated on behalf of customers globally. This will be protected through Federal and State statues that also extend to intellectual property and all form of data that resides on Cincom IT systems, networks and platforms globally. Cincom reserves the right to audit any system, network or data use profile at any time to ensure the security of customers globally.

Policy

All Cincom IT systems must be specifically used only for customer-based projects and completion of support and serving software coding and development. Employees have no expectation of privacy when using Cincom IT systems, and this includes personal use of the systems as well. Cincom reserves the right to audit all activity, inspect all systems, and also review the contents of computer files, electronic mailboxes, computer and WebEx conferencing systems, in addition to auditing all printed output bot through printer monitoring and actual hardcopy output.

Cincom reserves the right to initiate these audits based on the following...

...

When it is considered necessary to protect the security, research and programming outcomes of the company, and integrity of computing resources.
2. When there is justifiable cause to believe that a policy has been violated or system been used for illegal, unethical or immoral activities.

3. When analysis of computing resources shows unusual or excessively large amounts of download activity on a given account, including significant upload activity of large amounts of data.

4. When the integrity of the computing architecture is potentially compromised through the use of unsecured devices across VPN connections not designed for security by Cincom IT security technicians and staff.

Part II: Ethical, Legal, and Moral Implications of the Policy

The ethical, moral and legal implications of the Cincom IT policy are designed to protect the confidentiality of customer data globally while also setting the foundation for support of a geographically-dispersed workforce. The ethical implications of corporate use policies increasingly need to put responsibility for compliance back to the employee given the highly distributed nature of IT systems today (Siau, Nah, Teng, 2002). Cincom has done this both from an ethical and legal standpoint. The foundation of any effective IT Acceptable Use Policy is making compliance a personal responsibility of each employee (Welebir, Kleiner, 2005). This is precisely what Cincom has done. By concentrating on the ethical aspects of their IT Acceptable Use Policy, Cincom holds the employee ethically responsible for staying in compliance.

The moral aspects of their acceptable use policy are not as clear, as they openly state all activity can and will most likely be monitored given their close associated with governments globally. Compounding this moral dilemma for Cincom is the fact they are handling massive amounts of confidential data. The moral aspects of monitoring every personal interaction through their systems is, according to the guidelines, covered by their right to manage their IT systems and assets as they see fit. The morality of looking into each And every interchange (which Cincom has the technology to do) raises the issue of employee privacy. Cincom has made it clear from a moral standpoint they have the right to 100% of all activity on their systems. Employees are given this acceptable use policy when they first start working for the company. Cincom is setting the foundation of their moral stance on IT use by taking these steps to clearly define expectations early on. The use of acceptable use policies is critically important for establishing a moral and legal precedent to protect company assets over the long-term (Martin, 2009). From an ethical standpoint Cincom has defined a very clear set of boundaries for employees to adhere to and abide by, setting the foundation for strong legal precedents as well (Lichtenstein, Swatman, 1997).

The legal implications of the Cincom IT Acceptable Use IT Policy are clear. While many companies have taken a more relaxed approach to defining Internet access, this can often result in a myriad of potential legal threats to their core business (Hickins, 1999). As Cincom is heavily involved in government contracting and subcontracting with national defense ministries and departments of defense globally, the no-access approach to personal use of the Internet is a legally prudent move for the company to make. The potential for the authorized use and distribution of protected information is going to be significantly minimized by this decision. The legal precedent of now allowing for personal use of the Internet is very defensible, even in telework configurations and scenarios (Joice, Verive, 2006). Cincom's various departments have often discounted and complained about this move, yet it is clear that for the legal protection of the company and its customer relationships long-term this is critical to their success. The result has been impressive: not a single breach of customer data has ever been experienced by the company over four decades of working with international governments and the U.S. Department of Defense.

Appendix A: Description of Cincom Systems

Cincom Systems is a leading provider of enterprise software for aerospace, defense and complex manufacturing industries, and has offices in seventeen nations, with offices in…

Sources Used in Documents:

References

Hickins, M. (1999). Fighting surf abuse. Management Review, 88(6), 8-8.

Joice, W., & Verive, J. (2006). Telework and federal employee dependent care. Public Manager, 35(3), 44-49.

Lichtenstein, S., & Swatman, P.M.C. (1997). Internet acceptable usage policy for organizations. Information Management & Computer Security, 5(5), 182-190.

Martin, J.W. (2009). WHY YOU NEED AN EMPLOYEE POLICY for electronic information. Family Advocate, 32(2), 12-14.


Cite this Document:

"Employee It Acceptable Use Policy" (2012, October 18) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/employee-it-acceptable-use-policy-76025

"Employee It Acceptable Use Policy" 18 October 2012. Web.20 April. 2024. <
https://www.paperdue.com/essay/employee-it-acceptable-use-policy-76025>

"Employee It Acceptable Use Policy", 18 October 2012, Accessed.20 April. 2024,
https://www.paperdue.com/essay/employee-it-acceptable-use-policy-76025

Related Documents

Acceptable Use Policy Employee Acceptable Use Policy E-mail Policies and Procedures INSTANT MESSAGING Instant Messaging Policies and Procedures NETWORK AND INTERNET Personal Responsibility Permitted Use and Term Availability and Access Content and Communications Privacy Downloaded Files Confidential Information Prohibited Activities / Prohibited Uses Compliance Noncompliance SOFTWARE USAGE Software Usage Policies and Procedures ACKNOWLEDGEMENT OF UNDERSTANDING Acknowledgement of Receipt and Understanding (Spectorsoft, 2005, pp. 3-8). ELECTRONIC ACCESS POLICY The Company provides some, if not all, employees with electronic access, consisting of an e-mail system, a network connection, and Internet/Intranet access. This policy

Acceptable Use Policy for the Fire Department Designing, Developing, Implementing Acceptable Use Policy (AUP) Computers integral part fabric daily life fire service. Once a luxury, computer a necessity a multitude functions: computer aided dispatch, fire incident reporting, creating work schedules, outlining Purpose of the Acceptable Use Policy The fire department owns and operates the computing systems that are provided for use by the employees, fire men and women. The computing systems support the

Acceptable Use Policy AUP Policy Review: Los Angeles Unified School District With continuously evolving technologies, it is important for organizations to set up standards that helps mitigate potential liability in regards to staff potentially of using or misusing such technologies. It is obvious that an Acceptable Use Policy (AUP) is a very important policy within modern organizations in order to define what acceptable employee behavior when accessing company resources is. AUP's help

Policy Paper
PAGES 14 WORDS 4318

Policy Paper: Annotated Bibliography1. MIERNICKA, I. (2019). CHAPTER TWENTY DRESS CODE IN A WORKPLACE AS A CHALLENGE FOR LABOUR LAW RELATIONSHIPS IRMINA MIERNICKA.�Health at Work, Ageing and Environmental Effects on Future Social Security and Labour Law Systems, 434.https://books.google.co.ke/books?hl=en&lr=&id=szWEDwAAQBAJ&oi=fnd&pg=PA434&dq=importance+of+dress+code+policy+to+small+companies+and+laws+governing+such+policies+in+the+United+States&ots=bQmfcU8Ey6&sig=YKg7CmjgG_Wc1-43hquAXNaRiEM&redir_esc=y#v=onepage&q&f=falseThe article examines and analyzes various regulations and legislation governing dress code policies in the United States. For instance, Various legislations governing the conduct of small companies concerning employees� dress code are majorly

Internet has grown exponentially since its first introduction to the public. The precursor to the Internet was the ARPANET. The Advanced Research Projects Agency (ARPA) of the Department of Defense (Carlitz and Zinga, 1997) and the National Science Foundation (NSF) were the primary creators of the ARPANET. Subsequently however, efforts from private entities and universities have helped develop the network infrastructure, as it exists today. "The goals of ARPA's

Employee Handbook Privacy Section ABC Widget Company: Employee Handbook Privacy Section What privacy rights issues should be addressed? In the Age of Information, there are increasing concerns being voiced about what can legitimately be expected to be kept private, and how these issues affect employees' rights in the workplace. According to Hayden, Hendricks and Novak (1990, most adults spend approximately one-half of their waking hours in the workplace today, and it is therefore