Anheuser-Busch/Inbev Acceptable Use of Information Technology Policy
Scott Giles, Dayne Dickson, Dale Dierman, & Ronald Fletcher
Bellevue University
Acceptable Use of Information Technology Policy | Anheuser-Busch InBev
1.0 Overview
Though there are a number of reasons to provide a user network access, by far the most common is granting access to employees for performance of their job functions. This access carries certain responsibilities and obligations as to what constitutes acceptable use of the corporate network. This policy explains how corporate information technology resources are to be used and specifies what actions are prohibited. While this policy is as complete as possible, no policy can cover every situation, and thus the
…show more content…
The user should recognize this when using the Internet, and understand that it is a public domain and he or she can come into contact with information, even inadvertently, that he or she may find offensive, sexually explicit, or inappropriate. The user must use the Internet at his or her own risk. The company is specifically not responsible for any information that the user views, reads, or downloads from the Internet.
Personal Use. The company recognizes that the Internet can be a tool that is useful for both personal and professional purposes. Personal usage of company computer systems to access the Internet is permitted as long as such usage follows pertinent guidelines elsewhere in this document and does not have a detrimental effect on the company or on the user's job performance.
4.9 Copyright Infringement
The company's computer systems and networks must not be used to download, upload, or otherwise handle illegal and/or unauthorized copyrighted content. Any of the following activities constitute violations of acceptable use policy, if done
…show more content…
The company will take all necessary steps to report and prosecute any violations of this policy.
4.16 Non-Company-Owned Equipment
Non-company-provided equipment is expressly prohibited on the company's network.
4.17 Personal Storage Media
Personal storage devices such as USB flash drives/hard drives represent a serious threat to data security and are expressly prohibited on the company's network.
4.18 Software Installation
Installation of non-company-supplied programs is prohibited. Numerous security threats can masquerade as innocuous software - malware, spyware, and Trojans can all be installed inadvertently through games or other programs. Alternatively, software can cause conflicts or have a negative impact on system performance.
4.19 Reporting of Security Incident
If a security incident or breach of any security policies is discovered or suspected, the user must immediately notify his or her supervisor and/or follow any applicable guidelines as detailed in the corporate Incident Response