IT-related ethical workforce privacy issue

IT-relatedethical workforce privacy issue

Acceptable usepolicy

Overviewof the policy

Acceptable user policy is the set rules, which an individual mustadhere to before accessing a company’s internet or website. Therules are security measures since they were designed purposely toprotect both the security and privacy of an organization. Theguidelines are an important part of the information securitypolicies, and they are mostly given before entitled an access to thecompany’s security systems. The company’s reason for proposingthe use of the policy is not to impose restrictions on the workers,but to ensure its security is upheld (Siau, Nah&amp Teng 2002). Thepolicy was introduced to protect the employees, partners, and thecompany’s name from any illegal destructions that might jeopardizeits operations. For instance, a company like infosec introduced thepolicy after unknown criminals who hacked their account tainted thecompany’s name. The policy is useful because it protects thecompany’s Internet-related systems, software, operating systems,storage media, and network providing electronic mail (Siau, Nah&ampTeng 2002). The company introduced the system mainly to protect thebusiness’s purpose of serving the interest of the company andclients in their normal operations. Effective security is a mutualeffort that involves every worker, especially the internet securityteam in the company.


For long, the policy has been crucial to protecting the security andthe image of an organization from the hackers’ ill motives. Thechief purpose of the policy is to outline the required use ofinformation technology resources at any company. Therefore, the mainreason for stating the policies is to promote the efficient, ethical,and lawful use of the company’s information resources. The policyis instrumental given that it addresses the responsibility andcommitment of the users once access is granted, but it does not showthe user the accessing criteria (Council 2014). The policy wasestablished mainly to protect employees and employers from any formof cyber crime or damage. Additionally, the acceptable policyclarifies the application of code conducts to a specific computer andnetwork technologies in the company to prevent employees frominformation system misconduct (Siau, Nah&amp Teng 2002). Thedocument outlines the appropriate code of conducts that may protectthe company’s information resources from damage.

The code of conducts ensures the company’s employees behaveresponsibly to avoid exposing the company’s useful information tothe public. With the growing number of hackers, most companies haveenforced the policy to uphold the organization’s reputation and toprotect the company’s useful information from the public. Moreover,most companies have expressed their acknowledgment to the policysince it has helped some of its members with an appropriate knowledgeon the use of electronic facilities. The use of electronicfacilities, especially for technologically members can be posing athreat to the company’s operations (Siau, Nah&amp Teng 2002).Thus, the policy constitutes different guidelines, which directsmembers on how to use different electronic facilities such aselectronic mails. For doing so, the company can effectively conductits operations because a good number of its employees aretechnologically endowed. Additionally, the policy ensures all membersin an organization have access to the functional and safe network(Siau, Nah&amp Teng 2002). For instance, in Infosec Company thepolicy ensures access to the important sites that may improve theirworking ethics. Most companies have shown their contention with thepolicy because it has protected the company from assets from anyjeopardy. For instance, policy ensures an organization is protectedfrom any sabotage such as hacking. Besides, the policy is effectivein ensuring the organization complies with the required federal lawsconcerning information security. For example, for a long time, thefederal government rules have been trying to fight cyber crimes suchas hacking in the nation. Therefore, by implementing the acceptablepolicy rule, the organization will be helping the federal governmentin fighting cyber crimes.


The acceptable use policy applies to all users of organizationtechnology resources. Therefore, the policy applies to any system,components, and data connected to the company’s computer system(Council 2014). The policy is effective since it is appropriate forboth literate and illiterate employees of the company. The policy isappropriate to the third parties of the company such as clients, tounderstand the organization’s policies concerning the informationsecurity.


The users of the policy must comply with different requirements togranted the access to use the policy. For instance, comply with theintended use of any system or service in the company. Therefore, theusers are supposed to agree with the set standards before granted theaccess to the company’s resources (Siau, Nah&amp Teng 2002). Theusers are also required to comply with the ethical use of theorganization’s resources. For instance, the use of the company’sinformation systems for illegal operations is prohibited.


The violation of the acceptable user policy may have negativerepercussions to the users. The company enforces the company’sacceptable use policy and its standards at all times (Stanton, Stam,Mastrangelo, &amp Jolton 2005). The company works with its humanresource department to ensure members complies with the agreedpolicy. Additionally, the company’s team must approve any exceptionto the policy in advance.


Council, R. M. B. (2014). Acceptable use policy.

Siau, K., Nah, F. F. H., &amp Teng, L. (2002). Acceptable internetuse policy. Communications of the ACM, 45(1), 75-79.

Stanton, J. M., Stam, K. R., Mastrangelo, P., &amp Jolton, J.(2005). Analysis of end user security behaviors. Computers &ampSecurity, 24(2), 124-133.