IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Acceptable Use Policies

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: AUP, Acceptable Use Policy, Internet Usage Policies, Usage Policies, Web Usage Policies
DEFINITION: An acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided with access to a network or to the Internet. It is common practice for many businesses and educational facilities to require that employees or students sign an acceptable use policy before being granted a network ID. When you sign up with an Internet service provider (ISP), you will usually be presented  … 
Definition continues below.
Acceptable Use PoliciesMultimedia (View All Report Types)
51 - 75 of 549 Matches Previous Page  | Next Page
Business Transformation is needed for the New Style of IT
sponsored by Hewlett-Packard Limited
WEBCAST: In this on-demand video, learn how you can embrace a new style of IT by transforming your business and its processes with the right technology partner.
Posted: 11 Feb 2014 | Premiered: Nov 18, 2013

Hewlett-Packard Limited

CA Nimsoft Monitor Powers Up Cloud Services Management for IIJ Global Solutions Singapore
sponsored by CA Technologies.
VIDEO: Access this video to learn why IIJ Global Singapore chose to offer CA Unified Infrastructure Management (CA UIM) network and systems management services as an additional solution for their enterprise clients. You'll learn how this solution delivers better visibility into cloud resources across IT to management stakeholders.
Posted: 04 Nov 2014 | Premiered: 09 Oct 2014

CA Technologies.

Can Text Messaging Improve Communication Between Health Care Professionals?
sponsored by Imprivata
VIDEO: Watch this brief video and hear from Linda Reed, the VP/CIO of Atlantic Health on they implemented a text messaging system to deliver information instantly, and how it revolutionized their means of communication.
Posted: 11 Aug 2014 | Premiered: 11 Aug 2014

Imprivata

Capacity Management and Planning Made Easy
sponsored by Avocent
WEBCAST: Watch this webcast to learn about a software tool that can help you plan your data center layout in order to avoid the challenges of IT confusion, insufficient cabling, lack of cooling, and high power usage.
Posted: 19 May 2014 | Premiered: May 19, 2014

Avocent

Case study: Benefits of IT operations outsourcing
sponsored by Peak 10
VIDEO: An in-house IT infrastructure is a huge responsibility -- even a burden, especially when you don't have enough IT staff to support it. In this brief video, discover how TexMac turned to outsourcing for their IT operations.
Posted: 09 Oct 2014 | Premiered: 25 Aug 2014

Peak 10

Case Study: Improve Customer Experience with Managed Services
sponsored by Cisco & Fujitsu
VIDEO: Watch this brief video to learn about the managed services provider Mitchells & Butlers, a leading managed pub and pub restaurant operator, owning around 2,000 businesses offering food, drink and entertainment across the UK, partnered with to bring innovation to their business and help support a better guest experience.
Posted: 22 Oct 2014 | Premiered: 22 Aug 2013

Cisco & Fujitsu

Case Study: Nestle Nespresso Values Real-Time Security Intelligence from HP
sponsored by Hewlett-Packard Limited
VIDEO: This quick video explores who one of your peers turns to for security and threat intelligence which enables them to better protect their organization's and clients' most valuable assets.
Posted: 02 Aug 2013 | Premiered: 02 Aug 2013

Hewlett-Packard Limited

Case Study: Levi Strauss & Co. Gets Comfortable with Simpana Software
sponsored by CommVault
VIRTUAL TRADESHOW: Learn why the CTO of Levi Strauss & Co. switched to CommVault Simpana software. Clicking this link will take you to an interactive virtual tradeshow environment where you can read this white paper and access a variety of other resources. Continue on for more.
Posted: 02 Feb 2012 | Premiered: Feb 2, 2012

CommVault

CDW’s Threat Check Assessment
sponsored by CDW Corporation
WEBCAST: This exclusive webcast breaks down the current malware landscape and explores an assessment tool that will help you identify malware in your network now and protect you in the future.
Posted: 07 Oct 2014 | Premiered: Apr 8, 2014

CDW Corporation

Centrica Redefines Customer Relationship with HP Converged Cloud
sponsored by Hewlett-Packard Limited
VIDEO: This video case study covers a cloud-based solution that one organization used in order to eliminate data center downtime and applications that don't work.
Posted: 24 Feb 2014 | Premiered: 24 Feb 2014

Hewlett-Packard Limited

Bring Your Own Security to the Cloud
sponsored by CenterBeam
VIDEO: Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
Posted: 12 Jun 2013 | Premiered: 12 Jun 2013

CenterBeam

BSR Podcast: Obamacare, the Cloud's impact and more
sponsored by CA Technologies.
PODCAST: Today's businesses depend on IT to deliver competitive advantage and superior user experiences, and with business service reliability, you can do just that. But how do you leverage this concept to not only ensure application availability, but end-to-end service reliability? Tune in to this podcast and find out.
Posted: 09 Jan 2014 | Premiered: Nov 20, 2013

CA Technologies.

Build in security and drive innovation
sponsored by IBM
PODCAST: Hear from Patrick Vandenberg, IBM Security & Compliance Marketing Manager and Ewa Hoyt, IBM Security Application & Compliance Marketing manager, on how to make application security part of your development process. Reduce risk and costs, and keep your development teams productive to drive the innovation you need to compete and win.
Posted: 10 Nov 2011 | Premiered: Nov 10, 2011

IBM

Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat

Building Secure Private Clouds with VMware vCloud Director
sponsored by VMware, Inc.
WEBCAST: VMware vCloud Director gives you the ability to build secure private clouds that greatly increase datacenter efficiency and business agility. Coupled with VMware vSphere, VMware vCloud Director delivers cloud computing for existing datacenters by pooling virtual infrastructure resources and delivering them to users as catalog-based services.
Posted: 25 Apr 2011 | Premiered: Apr 25, 2011

VMware, Inc.

Business Process Management and Enterprise Architecture for Better Business Outcomes
sponsored by IBM
WEBCAST: This webcast explores how WebSphere and IBM Rational work together to help businesses achieve strategic objectives with reduced risk and cost and also for translating business vision and strategy into architectural change.
Posted: 16 Jun 2010 | Premiered: Jun 24, 2010, 12:00 EDT (16:00 GMT)

IBM

Butler County’s Iron Mountain Houses Some of U.S.’s Most Amazing, Priceless Treasures
sponsored by Iron Mountain
WEBCAST: This news story describes why Iron Mountain's Butler County, Pennsylvania data center facility is ideal for storing and preserving your business-critical data. Learn why this facility is trusted to securely store everything from the original prints of classic movies to a huge variety of documents and records.
Posted: 29 Jan 2014 | Premiered: Nov 19, 2013

Iron Mountain

BYOD Initiative and Workforce Mobility with the VMware Mobile Secure Workforce Solution
sponsored by VMware
WEBCAST: This exclusive webcast examines an enterprise mobility solution for simplifying IT control and keeping your workforce mobile.
Posted: 17 Oct 2013 | Premiered: Oct 17, 2013

VMware

CA Clarity Project and Portfolio Management
sponsored by CA Technologies.
PRODUCT DEMO: Watch this in-depth product demo to learn how CA Clarity works. This project and portfolio management solution enables users to view all projects, programs, services, assets, and applications in a collection of portfolios.
Posted: 31 Mar 2010 | Premiered: 30 Mar 2010

CA Technologies.

CA Data & Resource Protection
sponsored by CA Technologies.
VIDEO: CA data & resource protection is a set of solutions that provide a proactive approach to privileged user management and data loss prevention by securing sensitive information and critical systems, all without impacting normal business and IT activities. Watch this interactive video to learn more.
Posted: 01 Jun 2010 | Premiered: 01 Jun 2010

CA Technologies.

CA eHealth Performance Manager Demo
sponsored by CA Technologies.
PRODUCT DEMO: Download this demo to learn how you can proactively monitor performance of data and voice networks, physical and virtual systems, environmentals, databases and client/server applications across IT, all from one interface, before your business is negatively impacted.
Posted: 23 Nov 2009 | Premiered: 23 Oct 2009

CA Technologies.

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Case Based Alarms - Relevant and Actionable
sponsored by Virtual Instruments
VIDEO: Uncover the key features of a new approach to infrastructure monitoring that only sends 1 alert at a time, and contains all relevant case history in that alert.
Posted: 09 Jun 2014 | Premiered: 09 Jun 2014

Virtual Instruments

CentraStage Endpoint Management
sponsored by CentraStage
WEBCAST: This brief video explores one company's solution to endpoint management and how it can help managed service providers offer round-the-clock visibility of their endpoints
Posted: 11 Mar 2014 | Premiered: Jan 14, 2014

CentraStage

Centrify Express 2010.1
sponsored by Centrify Corporation
SOFTWARE DOWNLOAD: Centrify Express is the #1 choice of IT professionals for Active Directory-based single sign-on to Linux and Mac systems.  It is a free solution with more functionality, tools, and upgrade options than alternative offerings.
Posted: 06 Aug 2010 | Premiered: 06 Aug 2010

Centrify Corporation
51 - 75 of 549 Matches Previous Page    1 2 3 4 5 6    Next Page
 
ACCEPTABLE USE POLICIES DEFINITION (continued): … An acceptable use policy (AUP) is a policy that a user must agree to follow in order to be provided with access to a network or to the Internet. It is common practice for many businesses and educational facilities to require that employees or students sign an acceptable use policy before being granted a network ID. When you sign up with an Internet service provider (ISP), you will usually be presented with an AUP, which states that you agree to adhere to stipulations such as:Not using the service as part of violating any lawNot attempting to break the security of any computer network or userNot posting commercial messages to Usenet groups without prior permissionNot attempting to send junk e-mail or spam to anyone who doesn't want to receive itNot attempting to mail bomb a site with mass amounts of e-mail in order to flood their serverUsers also typically agree to report any attempt to break into their accounts.
Acceptable Use Policies definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement