2 to 3 pages Computer and email acceptable use policy Internet acceptable use policy Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. Be approximately 2-4 pages in length, not including the required cover page and reference page. Follow APA7 guidelines. Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources. Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. 1. Chapter 10, “Information Systems Sourcing” Text book: Managing and Using Information Systems, Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta, John Wiley & Sons 2. Chapter 10, “Information Systems Sourcing” pp. 224-234 Buhrendorf, E. (2019). Outsourcing IT is a money-saving cyber safety net for company data. Fairfield County Business Journal, 55(20), 12. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=b9h&AN=136657455&site=eds-live

Title: Computer and Email Acceptable Use Policy: Ensuring Security and Productivity in the Digital Age


In today’s technology-driven world, organizations heavily rely on computer systems and email communication to conduct their operations efficiently. However, the use of these resources can also pose significant risks to information security and overall productivity if not properly managed. To mitigate these risks, it is imperative for organizations to establish clear and comprehensive acceptable use policies (AUPs) that outline the guidelines and expectations for the appropriate use of computer systems and email within the organization. This paper aims to develop an AUP that reflects the business model and corporate culture of a specific organization, focusing on ensuring security and promoting productivity.

Computer Acceptable Use Policy

The computer acceptable use policy outlines the rules and guidelines governing the use of computer systems within the organization. It establishes the responsibilities and expectations of employees regarding the proper use of computer resources and adherence to ethical standards. Key components of the policy may include:

1. User Access and Permissions: The policy should define who has access to the organization’s computer systems and the level of access granted to each user. It should emphasize the importance of utilizing individual user accounts and ensuring the confidentiality and security of personal login credentials.

2. Prohibited Activities: The policy should clearly outline activities that are strictly prohibited on company computers. This may include unauthorized installation of software, accessing or sharing explicit or offensive material, engaging in illegal activities, or using company resources for personal gain.

3. Data Security: The policy should stress the significance of data security and outline best practices for protecting sensitive organizational information. This may include guidelines on password management, data encryption, regular data backups, and restrictions on file sharing outside the organization’s systems.

4. Software and Hardware Usage: The policy should govern the installation and usage of software and hardware on company computers. It may require employees to seek approval from the IT department before installing new software or connecting external devices to the network to prevent potential security threats.

Email Acceptable Use Policy

In today’s interconnected business environment, email serves as a crucial communication tool. However, the misuse or mishandling of email can expose an organization to various legal, security, and reputational risks. Therefore, an email acceptable use policy should be implemented to ensure responsible and efficient email usage. Key components of the policy may include:

1. Confidentiality and Privacy: The policy should emphasize the importance of maintaining confidentiality and privacy when using organizational email accounts. Employees should be reminded not to disclose sensitive information or proprietary data through email and to use encryption where appropriate.

2. Inappropriate Content: The policy should clearly state that it is unacceptable to send or forward emails containing offensive, discriminatory, or harmful content. Employees should be encouraged to exercise professionalism and treat all recipients with respect and courtesy.

3. Attachment Handling: The policy should provide guidelines for handling attachments to minimize the risk of malware infections and ensure efficient use of storage space. Employees should be educated on scanning attachments for viruses, using zip files for large attachments, and deleting unnecessary attachments to conserve storage capacity.

4. Email Retention and Deletion: The policy should specify the organization’s email retention and deletion practices in compliance with legal and regulatory requirements. It should outline the duration for which emails will be retained and mechanisms for archiving and retrieving important emails when necessary.


An effective computer and email acceptable use policy is essential for organizations to establish a secure and productive digital environment. By clearly communicating the guidelines and expectations for the appropriate use of computer systems and email, organizations can effectively minimize the risks associated with information security breaches, productivity loss, and legal liability. It is imperative for organizations to regularly review and update these policies to address emerging threats and technological advancements to ensure ongoing protection and efficiency in the digital age.

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.

Click Here to Make an Order Click Here to Hire a Writer