349 KB | 3 files | PDF, DOC
Even organizations that highly value openness and freedom of expression need to set guidelines for how team members use technology. This sample Acceptable Use Policy from a leading university will help your organization get started.
The mission of Vanderbilt University is to be a center of scholarly research, informed and creative teaching and service to the community and society at large. The university upholds the highest standards and is a leader in the quest for new knowledge through scholarship, dissemination of knowledge through teaching and outreach and creative experimentation of ideas and concepts. In pursuit of these goals, Vanderbilt values most highly intellectual freedom that supports open inquiry, and equality, compassion, and excellence in all endeavors.
To achieve its mission, the university applies substantial financial and personnel assets toward operating a reliable, available and secure network-computing infrastructure. The mass adoption of digital technologies in the everyday lives of members of our community requires that Vanderbilt establish clear policies that guide how community members may use the university's information technology resources. This Acceptable Use Policy (AUP) communicates the respective policies associated with our role in the Vanderbilt community as students, faculty, staff or other authorized users.
The attached Zip file includes:
The excerpt from chapter three addresses issues that should be considered before you decide to outsource, including security and privacy impacts and secure communication via telephone, email, mobile and smartphones, instant messaging and traditional mail. ... More >>
This publication presents a methodology for assigning authentication strengths based on the strength of pair wise bindings between the five entities involved in smart card based authentications. ... More >>
The Framework enables organizations – regardless of size, degree of cybersecurity risk, or cybersecurity sophistication – to apply the principles and best practices of risk management to improving the security and resilience of critical infrastructure. ... More >>