An acceptable use policy ( AUP ) (also acceptable usage policy or fair use policy ( FUP )) is a set of rules applied by the owner, creator, possessor or administrator of a computer network , website , or service that restricts the ways in which the network, website or system may be used and sets guidelines as to how it should be used. AUP documents are written for corporations , businesses , universities , schools , internet service providers (ISPs), and website owners, often to reduce the potential for legal action that may be taken by a user, and often with little prospect of enforcement.
34-424: Acceptable use policies are an integral and critical part of the framework of information security policies; it is often common practice to ask new members of an organization to sign an AUP before they are given access to its information systems, just in case. For this reason, an AUP must be concise and clear. While at the same time covering the most important points about what users are, and are not allowed to do with
68-411: A cap on what may be used. This is intended to allow normal usage but, prevent what is considered excessive. For example, users of an "unlimited" broadband Internet service may be subject to suspension, termination, or bandwidth limiting for usage which is continually excessive, unfair, affects other users enjoyment of the broadband service. Also, it is not consistent with the usage typically expected on
102-595: A feeling and a state of reality. One can feel secure, while they aren't, but also feel insecure while they are secure. This distinction is usually not very clear to express in the English language. The term is also used to refer to acts and systems whose purpose may be to provide security ( security company , security police , security forces , security service , security agency , security guard , cyber security systems , security cameras , remote guarding ). Security can be physical and virtual . The word 'secure' entered
136-458: A hostile environment (and potentially to project that power into its environment, and dominate it to the point of strategic supremacy ). Others argue that security depends principally on building the conditions in which equitable relationships can develop, partly by reducing antagonism between actors, ensuring that fundamental needs can be met, and also ensuring that differences of interest can be negotiated effectively. The table shows some of
170-415: A more common action is to terminate employment when violations may be hurting the employer in some way, or may compromise security . Earthlink, an American Internet service provider has a very clear policy relating to violations of its policy. The company identifies six levels of response to violations: Central to most AUP documents is the section detailing unacceptable uses of the network, as displayed in
204-542: A particular access package. The policy is enforced directly, without legal proceedings. AUP documents are similar to and often serve the same function as the Terms of Service document (e.g., as used by Google Gmail and Yahoo!), although not always. In the case of IBM for instance, the Terms of Use are about the way in which IBM presents the site, how they interact with visitors of the site and little to no instruction as to how to use
238-402: A wide range of means, including diplomacy , economic power , and military capabilities . Certain concepts recur throughout different fields of security: Since it is not possible to know with precision the extent to which something is 'secure' (and a measure of vulnerability is unavoidable), perceptions of security vary, often greatly. For example, a fear of death by earthquake is common in
272-400: A wide range of other senses: for example, as the absence of harm (e.g., freedom from want ); as the presence of an essential good (e.g., food security ); as resilience against potential damage or harm (e.g. secure foundations); as secrecy (e.g., a secure telephone line ); as containment (e.g., a secure room or cell ); and as a state of mind (e.g., emotional security ). Security is both
306-589: Is an emerging paradigm that, in response to traditional emphasis on the right of nation-states to protect themselves, has focused on the primacy of the security of people (individuals and communities). The concept is supported by the United Nations General Assembly , which has stressed "the right of people to live in freedom and dignity " and recognized "that all individuals, in particular vulnerable people, are entitled to freedom from fear and freedom from want ". Information security refers to
340-856: The Internet . The field has growing importance due to the increasing reliance on computer systems in most societies. It concerns the protection of hardware, software, data, people, and also the procedures by which systems are accessed. The means of computer security include the physical security of systems and the security of information held on them. Corporate security refers to the resilience of corporations against espionage , theft, damage, and other threats. The security of corporations has become more complex as reliance on IT systems has increased, and their physical presence has become more highly distributed across several countries, including environments that are, or may rapidly become, hostile to them. Environmental security, also known as ecological security, refers to
374-467: The English language in the 16th century. It is derived from Latin securus , meaning freedom from anxiety: se (without) + cura (care, anxiety). A security referent is the focus of a security policy or discourse; for example, a referent may be a potential beneficiary (or victim) of a security policy or system. Security referents may be persons or social groups, objects, institutions, ecosystems, or any other phenomenon vulnerable to unwanted change by
SECTION 10
#1732858399170408-502: The IT systems of an organization, it should refer users to the more comprehensive security policy where relevant. It should also, and very notably define what sanctions will be applied if a user breaks the AUP. Compliance with this policy should as usual, be measured by regular audits . In some cases a fair usage policy applied to a service allowing nominally unlimited use for a fixed fee simply sets
442-451: The Internet. Such a statement may outline the benefit of email systems, ability to gain information from websites , connection with other people through the use of instant messaging , and other similar benefits of various protocols including the relatively new VoIP services. The most important part of an AUP document is the code of conduct governing the behaviour of a user whilst connected to
476-671: The United States (US), but slipping on the bathroom floor kills more people; and in France, the United Kingdom, and the US, there are far fewer deaths caused by terrorism than there are women killed by their partners in the home. Another problem of perception is the common assumption that the mere presence of a security system (such as armed forces or antivirus software ) implies security. For example, two computer security programs installed on
510-562: The University of Chicago AUP. Unacceptable behaviours may include creation and transmission of offensive , obscene , or indecent document or images , creation and transmission of material which is designed to cause annoyance , inconvenience or anxiety , creation of defamatory material, creation and transmission that infringes copyright of another person, transmission of unsolicited commercial or advertising material and deliberate unauthorised access to other services accessible using
544-549: The Virginia Department of Education indicate that there are three other areas needing to be addressed in an AUP: Example: 6.3 This Policy shall be governed by the laws of England and the parties submit to the exclusive jurisdiction of the Courts of England and Wales. Due to the many jurisdictions covered by the Internet, the AUP document needs to specify the jurisdiction, which determines the laws that are applicable and govern
578-410: The action may be effective only temporarily, benefit one referent at the expense of another, or be entirely ineffective or counterproductive. Approaches to security are contested and the subject of debate. For example, in debate about national security strategies , some argue that security depends principally on developing protective and coercive capabilities in order to protect the security referent in
612-465: The connection to the network/Internet. Then there is the type of activity that uses the network to waste time of technical staff to troubleshoot a problem for which the user is the cause, corrupting or destroying other user's data, violating the privacy of others online, using the network in such a way that it denies the service to others, continuing to use software or other system for which the user has already been warned about using, and any other misuse of
646-573: The details below. Request from 172.68.168.132 via cp1112 cp1112, Varnish XID 391446854 Upstream caches: cp1112 int Error: 429, Too Many Requests at Fri, 29 Nov 2024 05:33:19 GMT Security Security is protection from, or resilience against, potential harm (or other unwanted coercion ). Beneficiaries (technically referents ) of security may be persons and social groups, objects and institutions, ecosystems, or any other entity or phenomenon vulnerable to unwanted change. Security mostly refers to protection from hostile forces, but it has
680-421: The forces of its environment. The referent in question may combine many referents in the same way that, for example, a nation-state is composed of many individual citizens. The security context is the relationships between a security referent and its environment. From this perspective, security and insecurity depend first on whether the environment is beneficial or hostile to the referent and also on how capable
714-405: The integrity of ecosystems and the biosphere , particularly in relation to their capacity to sustain a diversity of life-forms (including human life). The security of ecosystems has attracted greater attention as the impact of ecological damage by humans has grown. Food security refers to the ready supply of, and access to, safe and nutritious food. Food security is gaining in importance as
SECTION 20
#1732858399170748-448: The main domains where security concerns are prominent. Informational Physical Political Monetary The range of security contexts is illustrated by the following examples (in alphabetical order): Computer security, also known as cybersecurity or IT security, refers to the security of computing devices such as computers and smartphones, as well as computer networks such as private and public networks, and
782-435: The network or Internet. This may mean that the organization is not going to provide any warning system should the user contravene policy, maintaining that it is up to the user to know when his/her actions are in violation of policy. Often Acceptable Use Policy documents provide a statement about the use of the network and/or Internet and its uses and advantages to the business, school or other organisation sponsoring connection to
816-492: The network such as introduction of viruses. Disclaimers are often added in order to absolve an organisation from responsibility under specific circumstances. For example, in the case of Anglia Ruskin University a disclaimer is added absolving the University for errors or omissions or for any consequences arising from the use of information contained on the University website. While disclaimers may be added to any AUP, disclaimers are most often found on AUP documents relating to
850-482: The network/Internet. The code of conduct may include some description of what may be called netiquette which includes such items of conduct as using appropriate/polite language while online, avoiding illegal activities, ensuring that activities the user may embark on should not disturb or disrupt any other user on the system, and caution not to reveal personal information that could be the cause of identity theft . Most AUP statements outline consequences of violating
884-438: The philosophy of the sponsoring organization and intended reason as to why Internet use is offered to the users of that organization's network. For example, the sponsoring organization adopts a philosophy of self-regulation and offers the user connection to the local network and also connection to the Internet providing that the user accepts the fact she/he is going to be personally responsible for actions taken when connected to
918-405: The policy. Such violations are met with consequences depending on the relationship of the user with the organisation. Common actions that schools and universities take is to withdraw the service to the violator and sometimes if the activities are illegal the organization may involve appropriate authorities, such as the local police. Employers will at times withdraw the service from employees, although
952-403: The referent is of responding to their environment in order to survive and thrive. The means by which a referent provides for security (or is provided for) vary widely. They include, for example: Any action intended to provide security may have multiple effects. For example, an action may have a wide benefit, enhancing security for several or all security referents in the context; alternatively,
986-446: The same device can prevent each other from working properly, while the user assumes that he or she benefits from twice the protection that only one program would afford. Security theater is a critical term for measures that change perceptions of security without necessarily affecting security itself. For example, visual signs of security protections, such as a home that advertises its alarm system, may deter an intruder , whether or not
1020-488: The security of information in any form. Spoken, written, digital, networked, technological, and procedural forms of information are all examples that may be covered in an information security management scheme. Computer security, IT security, ICT security, and network security are thus all subdomains of information security. National security refers to the security of a nation-state , including its people, economy, and institutions. In practice, state governments rely on
1054-403: The site. In some cases, AUP documents are named Internet and E-mail Policy , Internet AUP , Network AUP , or Acceptable IT Use Policy . These documents, even though named differently, largely provide policy statements as to what behavior is acceptable from users of the local network/Internet connected via the local network. In general, AUP statements/documents often begin with a statement of
Acceptable use policy - Misplaced Pages Continue
1088-404: The use of a website while those offering a service fail to add such clauses. Particularly when an AUP is written for a college or school setting, AUPs remind students (or when in the case of a company, employees) that connection to the Internet, or use of a website, is a privilege not a right. Abuse of privileges can result in legal action from the school. In a handbook for writing AUP documents,
1122-505: The use of an AUP. Even if a company is only located in one jurisdiction and the AUP applies only to its employees, naming the jurisdiction saves difficulties of interpretation should legal action be required to enforce its statements. AUP can be effectively enforced with Content and URL filters. Information security Too Many Requests If you report this error to the Wikimedia System Administrators, please include
1156-402: The world's population has grown and productive land has diminished through overuse and climate change . Home security normally refers to the security systems used on a property used as a dwelling (commonly including doors, locks, alarm systems, lighting, fencing); and personal security practices (such as ensuring doors are locked, alarms are activated, windows are closed etc.) Human security
#169830