{"id":1326,"date":"2023-03-05T10:27:06","date_gmt":"2023-03-05T15:27:06","guid":{"rendered":"https:\/\/asginvestigations.com\/corporate\/?page_id=1326"},"modified":"2024-07-19T15:44:15","modified_gmt":"2024-07-19T19:44:15","slug":"acceptable-use-policies-computer-forensics-expert","status":"publish","type":"page","link":"https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/","title":{"rendered":"Acceptable Use Policies from the Perspective of a Computer Forensics Expert"},"content":{"rendered":"<div class=\"gb-container gb-container-f0cf2d08\"><div class=\"gb-inside-container\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-01555574\">\n<div class=\"gb-grid-column gb-grid-column-ae0aa6f8\"><div class=\"gb-container gb-container-ae0aa6f8\"><div class=\"gb-inside-container\">\n\n<p class=\"gb-headline gb-headline-d7d6b328 gb-headline-text line-before\">Discretion Expertise Results<\/p>\n\n\n\n<h1 class=\"gb-headline gb-headline-bf57f736 gb-headline-text\">Acceptable Use Policies from the Perspective of a Computer Forensics Expert<\/h1>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-0d4b2eec\"><div class=\"gb-container gb-container-0d4b2eec\"><div class=\"gb-inside-container\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n<div class=\"gb-container gb-container-89d3c5c7\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-d9ae0f7e gb-headline-text line-before second-line-indent\">Contact Us<\/h2>\n\n\n\n<!-- SharpSpring Form for Contact Us Sidebar - Spry Style (ASG New)  -->\n<script type=\"text\/javascript\">\n    var ss_form = {'account': 'MzawMDGzNDI3AgA', 'formID': 'MzG1ME8yNDHUNTVLTdM1MTM00LU0tDDTNTY1SDYwNTazMEqyAAA'};\n    ss_form.width = '100%';\n    ss_form.domain = 'app-3QNFC7F5DW.marketingautomation.services';\n    ss_form.hidden = {'_usePlaceholders': true};\n    \/\/ ss_form.hidden = {'field_id': 'value'}; \/\/ Modify this for sending hidden variables, or overriding values\n    \/\/ ss_form.target_id = 'target'; \/\/ Optional parameter: forms will be placed inside the element with the specified id\n    \/\/ ss_form.polling = true; \/\/ Optional parameter: set to true ONLY if your page loads dynamically and the id needs to be polled continually.\n<\/script>\n<script type=\"text\/javascript\" src=\"https:\/\/koi-3QNFC7F5DW.marketingautomation.services\/client\/form.js?ver=2.0.1\"><\/script>\n\n<\/div><\/div>\n\n<div class=\"gb-container gb-container-d79eeaf9\">\n<div class=\"gb-container gb-container-f0ab50c2\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-734aff11\">\n<div class=\"gb-grid-column gb-grid-column-21672ec2\"><div class=\"gb-container gb-container-21672ec2\">\n\n<figure class=\"gb-block-image gb-block-image-306236d4\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"546\" class=\"gb-image gb-image-306236d4\" src=\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensic-investigation.jpg\" alt=\"Computer Forensic investigations\" title=\"computer forensic investigation\" srcset=\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensic-investigation.jpg 800w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensic-investigation-300x205.jpg 300w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensic-investigation-768x524.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-55137b6e\"><div class=\"gb-container gb-container-55137b6e\">\n\n<p class=\"wp-block-paragraph\">In today\u2019s business world, computers are as ubiquitous as the pencil and paper of yesteryear. Most any type of business cannot function today without the use of computers in one fashion or another. It seems a paradox then, that at no other time in history, has the commodity of time been stolen and wasted by employees. These computers that were supposed to speed up our tasks and make us so much more efficient are being used as tools with which to waste more time than we could have ever been able to without them.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Imagine finding out that an employee has been wasting as much as 1-2 hours per day using the computer to surf the Internet or chat online with friends. As a supervisor, you let them know that their services are no longer required for obvious reasons. Mere days later, you are served with a Statement of Claim for wrongful dismissal. The claim? Nobody ever told this employee that they couldn\u2019t perform such activities. This has been used successfully in the past. This sadly is the unfortunate byproduct of a legal system in a democratic society.<\/p>\n\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-5908e4de\">\n<div class=\"gb-container gb-container-8fc80b44\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-2b02a22d\">\n<div class=\"gb-grid-column gb-grid-column-9ecfeed7\"><div class=\"gb-container gb-container-9ecfeed7\">\n\n<p class=\"wp-block-paragraph\">In order to respond to this type of travesty, we meet the challenge with a Corporate Acceptable Use Policy (AUP). Every company or entity with more than 1 employee (the owner) should have a strong AUP in place, and yet easily less than 40% of businesses have them. Most small businesses would say they aren\u2019t big enough to need one, but our example above shows that even 1 or 2 staff members could cause problems such as this.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">There should be no question that an AUP is a necessary and integral part of any business\u2019s computing environment. Out of the less than 40% of companies that actually an AUP, only about 10% are properly deployed. Experience, (usually bad), teaches us what works and what doesn\u2019t, and we have found in our investigations, that an improperly worded or deployed AUP is every bit as bad as no AUP at all.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">A myriad of issues need to be addressed in any AUP, and we have tried to address the most important ones here. Obviously no two companies are alike, and any AUP will need to be adjusted accordingly.<\/p>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-8d6d7814\"><div class=\"gb-container gb-container-8d6d7814\">\n\n<figure class=\"gb-block-image gb-block-image-bd9bca6a\"><img loading=\"lazy\" decoding=\"async\" width=\"1800\" height=\"1200\" class=\"gb-image gb-image-bd9bca6a\" src=\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensic-investigations.jpg\" alt=\"Computer Forensic Investigations\" title=\"computer forensic investigations\" srcset=\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensic-investigations.jpg 1800w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensic-investigations-300x200.jpg 300w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensic-investigations-1024x683.jpg 1024w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensic-investigations-768x512.jpg 768w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensic-investigations-1536x1024.jpg 1536w\" sizes=\"auto, (max-width: 1800px) 100vw, 1800px\" \/><\/figure>\n\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-fbb7b2c0\">\n<div class=\"gb-container gb-container-66d28775\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-9e61b739\">\n<div class=\"gb-grid-column gb-grid-column-ad62bb1a\"><div class=\"gb-container gb-container-ad62bb1a\">\n\n<figure class=\"gb-block-image gb-block-image-d82f9281\"><img loading=\"lazy\" decoding=\"async\" width=\"1800\" height=\"1200\" class=\"gb-image gb-image-d82f9281\" src=\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/Trade-Secret-Investigations.jpg\" alt=\"Trade Secret Investigations\" title=\"Trade Secret Investigations\" srcset=\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/Trade-Secret-Investigations.jpg 1800w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/Trade-Secret-Investigations-300x200.jpg 300w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/Trade-Secret-Investigations-1024x683.jpg 1024w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/Trade-Secret-Investigations-768x512.jpg 768w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/Trade-Secret-Investigations-1536x1024.jpg 1536w\" sizes=\"auto, (max-width: 1800px) 100vw, 1800px\" \/><\/figure>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-be7dffcc\"><div class=\"gb-container gb-container-be7dffcc\">\n\n<p class=\"wp-block-paragraph\">The single most important consideration for any computer network must be security. Security above all else will dictate the freedom of access that any user will have over their computer. Most small businesses have nothing to govern the access their users have. A user can make changes to the computer, transfer data at will, and use the Internet to go anywhere they want, with no restriction. On the other end of the spectrum, high security installations, such as various branches of government, and R &amp; D for large scale companies have extremely tight restrictions on what employees can do.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">An AUP is not just for employees either. It needs to have direction in it regarding contractors that may use your network, either by sitting at your computers, or by connecting their own devices.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Security is a double edged sword that must be considered. At one end of the scale is convenience, and at the other end is security. The trick is to find the balance at which the two work for a company\u2019s applications. As well, it would be unreasonable to apply the same settings and rules to all computers in the network. Obviously the CEO, as well as a development department may need far greater access than a data entry clerk.<\/p>\n\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-b437fa15\">\n<div class=\"gb-container gb-container-6d9b8758\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-ba89df08\">\n<div class=\"gb-grid-column gb-grid-column-4eb29dc2\"><div class=\"gb-container gb-container-4eb29dc2\">\n\n<h2 class=\"gb-headline gb-headline-dc938b11 gb-headline-text\"><strong>Deployment Considerations<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Having an AUP is not enough. We have seen cases where a wrongful dismissal case was successfully won because the employee stated that although they had signed an AUP upon being hired 2 years prior, they couldn\u2019t possibly remember what it said. You cannot have an employee sign a piece of paper upon hiring, and expect them to remember its contents forever. You must have the AUP deployed in such a way as to ensure the employees always have access to it.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The most efficient way to do this is to have what is called a \u201cclick through\u201d notice. In order for employees to log on to computers, they must first click their acknowledgement and agreement with the AUP. There should be a clickable link to the full AUP from this page. This completely eliminates the \u201cI didn\u2019t know\u201d argument.<\/p>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-72d8a2d3\"><div class=\"gb-container gb-container-72d8a2d3\">\n\n<figure class=\"gb-block-image gb-block-image-c32ecd4a\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"533\" class=\"gb-image gb-image-c32ecd4a\" src=\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/Wrongful-Termination.jpg\" alt=\"Wrongful termination - acceptable policies from the perspective of a computer forensic expert\" title=\"Wrongful Termination\" srcset=\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/Wrongful-Termination.jpg 800w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/Wrongful-Termination-300x200.jpg 300w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/Wrongful-Termination-768x512.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-90159d54\">\n<div class=\"gb-container gb-container-d26fd6a9\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-b20a811d\">\n<div class=\"gb-grid-column gb-grid-column-ba147b5e\"><div class=\"gb-container gb-container-ba147b5e\">\n\n<figure class=\"gb-block-image gb-block-image-ae692e6b\"><img loading=\"lazy\" decoding=\"async\" width=\"1800\" height=\"1175\" class=\"gb-image gb-image-ae692e6b\" src=\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/channel-checking.jpg\" alt=\"Basic Business identification investigation\" title=\"channel checking\" srcset=\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/channel-checking.jpg 1800w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/channel-checking-300x196.jpg 300w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/channel-checking-1024x668.jpg 1024w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/channel-checking-768x501.jpg 768w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/channel-checking-1536x1003.jpg 1536w\" sizes=\"auto, (max-width: 1800px) 100vw, 1800px\" \/><\/figure>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-35d01b00\"><div class=\"gb-container gb-container-35d01b00\">\n\n<h2 class=\"gb-headline gb-headline-a56faa97 gb-headline-text\"><strong>How Much Internet Access and When<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">There is no question that employees would be perturbed if they were not allowed any access to the Internet. Having said that, if the employee has no need at all to use the Internet for their daily role, then why have it? It is possible in many different ways for an employee to send and receive email with no Internet access.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Arguments that have been brought up in court in the past have been things like how the AUP applies to coffee breaks, lunches, overtime, employees staying late on their own time, etc. While an unpaid lunch hour may very well be the employee\u2019s time, the computer and network used to access the Internet still belong to the company. If the employee accidentally infects the network and causes a great deal of damage and downtime, the virus won\u2019t care if it was done on paid time or not. Purely from a security perspective, Internet activity needs to be strongly regulated no matter when the computer is in use.<\/p>\n\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-7a933b15\">\n<div class=\"gb-container gb-container-b2b6b75a\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-e67ca688\">\n<div class=\"gb-grid-column gb-grid-column-d6c89b67\"><div class=\"gb-container gb-container-d6c89b67\">\n\n<h2 class=\"gb-headline gb-headline-6977fee2 gb-headline-text\"><strong><strong>Transferring of Data<\/strong><\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Probably one of the most prevalent abuses seen in the corporate world is the theft of proprietary data. Very common also, is the destruction of corporate data by a disgruntled employee. An AUP should outline what access, if any, an employee has to the data storage areas of the network, as well as what the rules are pertaining to removing it from the network. AUPs should address the deletion of files as well.<\/p>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-604d690a\"><div class=\"gb-container gb-container-604d690a\">\n\n<figure class=\"gb-block-image gb-block-image-ffcb0c0f\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"533\" class=\"gb-image gb-image-ffcb0c0f\" src=\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensics-investigations.jpg\" alt=\"computer forensic expert discusses acceptable use policies\" title=\"computer forensics investigations\" srcset=\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensics-investigations.jpg 800w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensics-investigations-300x200.jpg 300w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensics-investigations-768x512.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-6b4efcb3\">\n<div class=\"gb-container gb-container-d3326d78\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-266c64fb\">\n<div class=\"gb-grid-column gb-grid-column-d1be0998\"><div class=\"gb-container gb-container-d1be0998\">\n\n<figure class=\"gb-block-image gb-block-image-2ca82a42\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"546\" class=\"gb-image gb-image-2ca82a42\" src=\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/stealing-data-with-external-hard-drive.jpg\" alt=\"connecting devices - acceptable use policies from the perspective of a computer forensics expert\" title=\"stealing data with external hard drive\" srcset=\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/stealing-data-with-external-hard-drive.jpg 800w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/stealing-data-with-external-hard-drive-300x205.jpg 300w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/stealing-data-with-external-hard-drive-768x524.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-72047301\"><div class=\"gb-container gb-container-72047301\">\n\n<h2 class=\"gb-headline gb-headline-539466b5 gb-headline-text\"><strong><strong><strong>Connecting Devices<\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Any AUP needs to address the connection of outside devices to the computer. Are employees allowed to use their USB thumb drives on any computer in the network? How about outside CDs or DVDs? A very common example of corporate espionage today involves loading a number of USB drives with malicious programming that will open a back door into the network. These USB drives are then randomly \u201cdropped\u201d somewhere where employees will find them, such as the coffee shop in the building lobby, or around the elevator on the company <a href=\"https:\/\/epoxyprofessionals.com\/\">floor<\/a>. Human nature is such that the first thing we want to do is plug it into our computer to see what is on it. Once plugged in, it is too late, and the malicious programming automatically deploys. It is also possible to allow USB devices, but set the computers up so that data transfer is one way. In other words, users can move data FROM the device TO the computer, but not the other way. The vast majority of competitive intelligence is stolen in this manner. Fortunately, we have the investigative and technical ability to not only show what was stolen, but how, and when.<\/p>\n\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-7c17eb89\">\n<div class=\"gb-container gb-container-62ad2290\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-8c0e8f3a\">\n<div class=\"gb-grid-column gb-grid-column-4ec20b2d\"><div class=\"gb-container gb-container-4ec20b2d\">\n\n<h2 class=\"gb-headline gb-headline-40d5ada8 gb-headline-text\"><strong><strong><strong>Changing Settings<\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Your AUP should give direction on what a user is allowed to change or modify on their computer. Most AUPs have a blanket policy that bars users from changing any settings. This is a good policy, but again this is one area that a lot of damage can be done. By accidentally changing a setting (or intentionally), a user can cause thousands upon thousands of dollars of damage to a network. Viruses can be injected into a system through something as innocent as changing a screensaver or the desktop wallpaper. As well, a common monitoring program found in Windows networked computers can easily be shut off by a couple of mouse clicks.<\/p>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-9df9d6de\"><div class=\"gb-container gb-container-9df9d6de\">\n\n<figure class=\"gb-block-image gb-block-image-c78ac924\"><img loading=\"lazy\" decoding=\"async\" width=\"760\" height=\"486\" class=\"gb-image gb-image-c78ac924\" src=\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/corporate-cta-3.webp\" alt=\"computer forensic investigations\" srcset=\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/corporate-cta-3.webp 760w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/corporate-cta-3-300x192.webp 300w\" sizes=\"auto, (max-width: 760px) 100vw, 760px\" \/><\/figure>\n\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-694fb6ec\">\n<div class=\"gb-container gb-container-c587db81\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-8d455be3\">\n<div class=\"gb-grid-column gb-grid-column-06c055c5\"><div class=\"gb-container gb-container-06c055c5\">\n\n<figure class=\"gb-block-image gb-block-image-01178a66\"><img loading=\"lazy\" decoding=\"async\" width=\"1800\" height=\"1035\" class=\"gb-image gb-image-01178a66\" src=\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/private-investigator.jpg\" alt=\"Private investigator\" title=\"private investigator\" srcset=\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/private-investigator.jpg 1800w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/private-investigator-300x173.jpg 300w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/private-investigator-1024x589.jpg 1024w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/private-investigator-768x442.jpg 768w, https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/private-investigator-1536x883.jpg 1536w\" sizes=\"auto, (max-width: 1800px) 100vw, 1800px\" \/><\/figure>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-d132c2d3\"><div class=\"gb-container gb-container-d132c2d3\">\n\n<h2 class=\"gb-headline gb-headline-a09b45b4 gb-headline-text\"><strong><strong><strong><strong>AUP Augmentation<\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Although an AUP should be an integral part of any network environment, it is not a panacea. It should be backed up with proper network administration. Most every issue I have addressed in this article can be further enforced by proper permissions deployment across the computers in the network. A very brief list of settings that can be controlled include:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">When the Internet can be accessed, if at all<br>What websites can be accessed and which ones cannot<br>What settings a user can change on their computer<br>What programs can be accessed and when<br>What devices can be connected to the computer, if any<br>Although some of the above may sound draconian, the employer must first ask themselves what they have to lose, if the above is not followed. Without a properly advised and administered AUP the employer might also find themselves on the wrong end of Federal Wiretap Laws. Acceptable Use Policies have not developed simply because somebody had extra time on their hands. Sadly they have been born of necessity.<\/p>\n\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-7756501c\"><div class=\"gb-inside-container\">\n\n<h3 class=\"wp-block-heading line-before second-line-indent has-50-font-size\">Important<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">The above information concerning&nbsp;Acceptable Use Policies from a Computer Forensics Expert is the sole opinion of the author and NOT legal advice in any capacity. Seek legal advice from your attorney before acting upon any of the information contained in this article.<\/p>\n\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Contact Us Important The above information concerning&nbsp;Acceptable Use Policies from a Computer Forensics Expert is the sole opinion of the author and NOT legal advice in any capacity. Seek legal advice from your attorney before acting upon any of the information contained in this article.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-1326","page","type-page","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Acceptable Use Policies From a Computer Forensics Expert<\/title>\n<meta name=\"description\" content=\"Read about the Acceptable Use Policies (AUP) from the perspective of a computer forensics expert. For more information, call us today!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Acceptable Use Policies From a Computer Forensics Expert\" \/>\n<meta property=\"og:description\" content=\"Read about the Acceptable Use Policies (AUP) from the perspective of a computer forensics expert. For more information, call us today!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/\" \/>\n<meta property=\"og:site_name\" content=\"Corporate Services\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-19T19:44:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensic-investigation.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/\",\"url\":\"https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/\",\"name\":\"Acceptable Use Policies From a Computer Forensics Expert\",\"isPartOf\":{\"@id\":\"https:\/\/asginvestigations.com\/corporate\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensic-investigation.jpg\",\"datePublished\":\"2023-03-05T15:27:06+00:00\",\"dateModified\":\"2024-07-19T19:44:15+00:00\",\"description\":\"Read about the Acceptable Use Policies (AUP) from the perspective of a computer forensics expert. For more information, call us today!\",\"breadcrumb\":{\"@id\":\"https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/#primaryimage\",\"url\":\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensic-investigation.jpg\",\"contentUrl\":\"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensic-investigation.jpg\",\"width\":800,\"height\":546,\"caption\":\"Computer Forensic investigations \/ Hiring a Computer Forensics Expert\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/asginvestigations.com\/corporate\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Acceptable Use Policies from the Perspective of a Computer Forensics Expert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/asginvestigations.com\/corporate\/#website\",\"url\":\"https:\/\/asginvestigations.com\/corporate\/\",\"name\":\"Corporate Services\",\"description\":\"Expert Private Investigators for surveillance &amp; background checks\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/asginvestigations.com\/corporate\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Acceptable Use Policies From a Computer Forensics Expert","description":"Read about the Acceptable Use Policies (AUP) from the perspective of a computer forensics expert. For more information, call us today!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/","og_locale":"en_US","og_type":"article","og_title":"Acceptable Use Policies From a Computer Forensics Expert","og_description":"Read about the Acceptable Use Policies (AUP) from the perspective of a computer forensics expert. For more information, call us today!","og_url":"https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/","og_site_name":"Corporate Services","article_modified_time":"2024-07-19T19:44:15+00:00","og_image":[{"url":"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensic-investigation.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/","url":"https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/","name":"Acceptable Use Policies From a Computer Forensics Expert","isPartOf":{"@id":"https:\/\/asginvestigations.com\/corporate\/#website"},"primaryImageOfPage":{"@id":"https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/#primaryimage"},"image":{"@id":"https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/#primaryimage"},"thumbnailUrl":"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensic-investigation.jpg","datePublished":"2023-03-05T15:27:06+00:00","dateModified":"2024-07-19T19:44:15+00:00","description":"Read about the Acceptable Use Policies (AUP) from the perspective of a computer forensics expert. For more information, call us today!","breadcrumb":{"@id":"https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/#primaryimage","url":"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensic-investigation.jpg","contentUrl":"https:\/\/asginvestigations.com\/corporate\/wp-content\/uploads\/sites\/5\/2023\/03\/computer-forensic-investigation.jpg","width":800,"height":546,"caption":"Computer Forensic investigations \/ Hiring a Computer Forensics Expert"},{"@type":"BreadcrumbList","@id":"https:\/\/asginvestigations.com\/corporate\/acceptable-use-policies-computer-forensics-expert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/asginvestigations.com\/corporate\/"},{"@type":"ListItem","position":2,"name":"Acceptable Use Policies from the Perspective of a Computer Forensics Expert"}]},{"@type":"WebSite","@id":"https:\/\/asginvestigations.com\/corporate\/#website","url":"https:\/\/asginvestigations.com\/corporate\/","name":"Corporate Services","description":"Expert Private Investigators for surveillance &amp; background checks","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/asginvestigations.com\/corporate\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/asginvestigations.com\/corporate\/wp-json\/wp\/v2\/pages\/1326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/asginvestigations.com\/corporate\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/asginvestigations.com\/corporate\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/asginvestigations.com\/corporate\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/asginvestigations.com\/corporate\/wp-json\/wp\/v2\/comments?post=1326"}],"version-history":[{"count":3,"href":"https:\/\/asginvestigations.com\/corporate\/wp-json\/wp\/v2\/pages\/1326\/revisions"}],"predecessor-version":[{"id":1940,"href":"https:\/\/asginvestigations.com\/corporate\/wp-json\/wp\/v2\/pages\/1326\/revisions\/1940"}],"wp:attachment":[{"href":"https:\/\/asginvestigations.com\/corporate\/wp-json\/wp\/v2\/media?parent=1326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}