{"id":231,"date":"2013-02-07T00:00:00","date_gmt":"2013-02-07T00:00:00","guid":{"rendered":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/02\/07\/communications-acceptable-use-policies-some-cybersecurity-considerations\/"},"modified":"2024-06-23T17:55:29","modified_gmt":"2024-06-23T17:55:29","slug":"communications-acceptable-use-policies-some-cybersecurity-considerations","status":"publish","type":"post","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/02\/07\/communications-acceptable-use-policies-some-cybersecurity-considerations\/","title":{"rendered":"Communications Acceptable Use Policies: Some Cybersecurity Considerations"},"content":{"rendered":"<p>Managing employee communications devices in the always-connected global business community has become an important issue for information security personnel engaged in the design of effective security policies (<a title=\"Kabay, 2009 #368\" href=\"\/Users\/JaneGinn\/Documents\/_Learning\/Norwich\/GI-532\/W6\/03-RGinn-02-Final.doc#_ENREF_6\">Kabay, 2009<\/a>).\u00a0 Key to successful management that avoids out-bound data loss and leakage and in-bound malicious attacks is buy-in and active participation by all corporate employees.\u00a0 A comprehensive Communications Acceptable Use Policy (CAUP) that addresses each issue systematically and is part of every employment agreement is also important for success (<a title=\"Stewart, 2002 #414\" href=\"\/Users\/JaneGinn\/Documents\/_Learning\/Norwich\/GI-532\/W6\/03-RGinn-02-Final.doc#_ENREF_13\">Stewart, 2002<\/a>). Select provisions of such an agreement should also be part of all third-party contracts, as well.<\/p>\n<p>Construction of a CAUP requires a working knowledge of the key issues that must be addressed (<a title=\"SANS, 2007 #420\" href=\"\/Users\/JaneGinn\/Documents\/_Learning\/Norwich\/GI-532\/W6\/03-RGinn-02-Final.doc#_ENREF_9\">SANS, 2007<\/a>). To be effective, the policy design should be clearly correlated with the company\u2019s legal liabilities and use proper netiquette that is consistent with the corporate culture.\u00a0 In the banking and financial services sector (BFSS) this will include considerations of intellectual property protection, bank secrecy\/anti-fraud considerations, customer privacy and other issues (<a title=\"Grimm, 2010, March #419\" href=\"\/Users\/JaneGinn\/Documents\/_Learning\/Norwich\/GI-532\/W6\/03-RGinn-02-Final.doc#_ENREF_5\">Grimm, 2010, March<\/a>). This is especially important in the Bring Your Own Device (BYOD) era where employees are increasingly blending business and personal activities through their communications devices (<a title=\"Roberts, 2012, October #412\" href=\"\/Users\/JaneGinn\/Documents\/_Learning\/Norwich\/GI-532\/W6\/03-RGinn-02-Final.doc#_ENREF_8\">Roberts, 2012, October<\/a>).<\/p>\n<p>This paper will address some of the key components for constructing a CAUP for the BFSS.\u00a0 Legal and regulatory constructs and case (i.e. common) law will be used to substantiate my list of key components.<\/p>\n<p align=\"center\"><b>Key Drivers<br \/>\n<\/b><\/p>\n<p>From a review of multiple CAUPs and the critical literature on the subject P.A. Laughton developed a hierarchical view of the importance of key drivers for the design of a CAUP.\u00a0 He found a wide range of examples that varied from being too vague, or, conversely, too restrictive (<a title=\"Laughton, 2008, December #415\" href=\"\/Users\/JaneGinn\/Documents\/_Learning\/Norwich\/GI-532\/W6\/03-RGinn-02-Final.doc#_ENREF_7\">Laughton, 2008, December<\/a>). Importantly, he found that the evolving nature of Internet law showed that CAUPs must be viewed as dynamic, living documents that must be revised to reflect the changing liabilities a company faces and responsibilities employees must be informed of.<\/p>\n<p>Important findings among the studies he reviewed included the work of Flowers and Rakes (<a title=\"Flowers, 2000 #421\" href=\"\/Users\/JaneGinn\/Documents\/_Learning\/Norwich\/GI-532\/W6\/03-RGinn-02-Final.doc#_ENREF_2\">2000<\/a>).\u00a0 They identified four generic areas that should be included in every CAUP:\u00a0 (1) liability issues and concerns; (2) online behavior; (3) system integrity, and; (4) the quality of the content.\u00a0 Flowers and Rakes \u201cgeneric areas\u201d were adapted by Laughton in designing the list of \u201cdrivers\u201d for his hierarchical ranking.<\/p>\n<p>In a separate, and somewhat playful analysis by Scott and Vass a Seven P\u2019s Model is suggested:\u00a0 (1) participation; (2) partitioning; (3) philosophy; (4) privacy; (5) pernickety (do\u2019s and do nots of the policy); (6) phog phactor (ways to improve readability and reduce legalistic jargon); and (7) publication (<a title=\"Scott, 1994 #422\" href=\"\/Users\/JaneGinn\/Documents\/_Learning\/Norwich\/GI-532\/W6\/03-RGinn-02-Final.doc#_ENREF_11\">1994<\/a>). Importantly for my analysis, Laughton uses their framework to inform his 2008 model.<\/p>\n<p>Laughton also found that previous studies and surveys failed to rank the relative level of importance of design drivers that should be dealt with in a CAUP.\u00a0 He offers such a ranking based on the acceptability of the CAUP to user communities and his own expert opinion.<\/p>\n<p>In the years since Laughton developed his model, and as companies have become more adept at crafting effective policies, the statutory, and regulatory and case law has evolved significantly.\u00a0 In fact, in the United States, legal frameworks have emerged in all of the categories of drivers originally proposed by Laughton, especially in highly regulated industries such as the BFSS.<\/p>\n<p>Table 1 lists some key examples specific to CAUP construction for the BFSS.<\/p>\n<p><b>Table 1.\u00a0 Laughton\u2019 Drivers and Modern Legal Frameworks for the BFSS<\/b><\/p>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"115\"><b>Laughton\u2019s Driver<\/b><\/td>\n<td valign=\"top\" width=\"240\"><b>Statutory &amp; Regulatory Frameworks<\/b><\/td>\n<td valign=\"top\" width=\"283\"><b>Examples of Case Law<\/b><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"115\">Legal Drivers<\/td>\n<td valign=\"top\" width=\"240\"><b><i>All laws and regulations listed <\/i><\/b><\/td>\n<td valign=\"top\" width=\"283\"><b><i>All cases listed <\/i><\/b><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"115\">Netiquette<\/td>\n<td valign=\"top\" width=\"240\">Title VII of the Civil Rights Act of 1964, as Amended; Age Discrimination Act of 1967, as Amended; Americans With Disabilities Act of 1990, as Amended<\/td>\n<td valign=\"top\" width=\"283\">Smith v. Pillsbury (on professionalism in Email)<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"115\">Security<\/td>\n<td valign=\"top\" width=\"240\">Gramm-Leach-Bliley Act (specific to BFSS) Safeguards Rule (on employee\u2019s obligations to protect customer data); Sarbanes-Oxley (SOX) Section 404 Audits<\/td>\n<td valign=\"top\" width=\"283\">Shoars v. Epson America (on monitoring of Email)<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"115\">Privacy<\/td>\n<td valign=\"top\" width=\"240\">Omnibus Crime Control and Safe Streets Act, Title III (on criminal investigation); Communications Assistance for Law Enforcement Act (on criminal investigations); Children\u2019s Online Privacy Protection Act of 1998, as Amended; Red Flags Rule under the Fair and Accurate Credit Transactions Act of 2003; FINRA Notices 10-06 &amp; 11-39<\/td>\n<td valign=\"top\" width=\"283\">Paul F. Ryan v. James F. Normandin (on invasion of privacy); York v. General Electric (on employee surveillance to be limited to public behavior); Rushing v. Hershey Chocolate (on routine drug screening); Double Click Inc. Privacy Litigation, [154 F. Supp. 2d 497, 502-03 (S.D.N.Y. 2001)]; 13 U.S. v. William Cannon; U.S. v. Ramos; People v. James D. Kent (on child pornography)<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"115\">Organizational Property<\/td>\n<td valign=\"top\" width=\"240\">Economic Espionage Act of 1996, as Amended; Computer Fraud and Abuse Act of 1986, as Amended by the USA PATRIOT Act;<\/td>\n<td valign=\"top\" width=\"283\">LVRC Holdings v. Brekka (on business Email sent to personal laptop); Automatec Transactions, LLC v. IVG Holding Co.(on patent infringement); PhoneDog v. Kravitz (on follower list ownership); Litigation Mgt. Inc. V. Bourgeois (Ohio, 2011) (on non-competition); Walker Mfg. v. Hoffmann (on reverse engineering).<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>What becomes clear from this sampling of legal, regulatory and case law citations is that within each of the subordinate driver categories set forth by Laughton these legal drivers are vital for the design and development of a CAUP.\u00a0 Each one of the factors identified should be addressed from a legal, regulatory and case law point of view to avoid organizational liability, ensure customer and employee privacy, and protect the intellectual property of the enterprise. Therefore, the legal drivers should be envisioned as cross-cutting categories that are applicable to each of Laughton\u2019s other key drivers.<\/p>\n<p>I would recommend an alternative \u201chierarchy\u201d to the one proposed by Laughton.\u00a0 In my model all four of Laughton\u2019s categories are subjected, systematically, to a review of the legal, regulatory and case law history. Also notice that the order of the ranking has changed to illustrate the emphasis placed on security, privacy and intellectual property protection within the BFSS.\u00a0 For example, Netiquette, although an important factor for guiding the readability of the CAUP, is less important in this sector, given the legal liabilities companies face.<\/p>\n<p><b>Figure 2. Ginn\u2019s Model of Design Drivers for a CAUP for the BFSS<\/b><\/p>\n<p>Below are some examples of how these legal directives relate specifically to concerns of companies within the BFSS.\u00a0 I have used only a small sample of the laws and cases cited on Table 1, above.<\/p>\n<p><b>Security<\/b><\/p>\n<p>Gramm-Leach-Bliley Act (GLBA) regulated parties must protect against unauthorized access, ensure the security and confidentiality of customer records and information, and protect against any anticipated threats or hazards to the security or integrity of records.\u00a0 The Safeguards rule, issued by authority of GLBA, states that BFSS firms must develop, implement, and maintain a comprehensive information security program that is written in \u201cone or more readily accessible parts and contains administrative, technical, and physical safeguards that are appropriate to its size and complexity\u201d (<a title=\"FTC, 2002, May 23 #238\" href=\"\/Users\/JaneGinn\/Documents\/_Learning\/Norwich\/GI-532\/W6\/03-RGinn-02-Final.doc#_ENREF_3\">FTC, 2002, May 23<\/a>). A key consideration for the CAUP designer will be <i>how<\/i> to communicate this program to all employees so that they have a stake in the total security management program.\u00a0 This is where awareness training becomes an integral part of the implementation process.<\/p>\n<p>The Shoars v. Epson America case cited in Table 1 illustrates this point.\u00a0 In this 1994 case the plaintiff alleged that her termination occurred in retaliation for her reporting of, and refusal to go along with, interception of her Email, based on prohibitions concerning wiretapping and eavesdropping.\u00a0 A comprehensive training program and a well-designed CAUP that made the employee a partner in information security could have alerted her to the practice of company monitoring of Email communications within a less adversarial context.\u00a0 It is possible that such a training program could have helped Epson avoid this lawsuit.<\/p>\n<p><b>Privacy<\/b><\/p>\n<p>In my review of the privacy-related case law the majority of the cases involved enforcement action under the Children\u2019s Online Privacy Protection Act (COPPA).\u00a0 At a minimum a CAUP should specify acceptable employee behavior online regarding children\u2019s privacy.\u00a0 For purposes of this law, a child is defined as a minor under 13 years old.<\/p>\n<p>There are, however, many other privacy-related provisions that are more central to management considerations in the BFSS.\u00a0 Many of these are cited in the Privacy section of Table 1. Note that there are several laws that are tied to criminal investigations in the event of white collar crime and fraud.\u00a0 Forensics investigators into BFSS incidents need to know when and how their investigations can be questioned and\/or evidence excluded from a court proceeding because an accused party\u2019s right to privacy has been invaded.<\/p>\n<p><b>Organizational Property \u00a0\u00a0\u00a0\u00a0\u00a0 <\/b><\/p>\n<p>In September of 2011 a Grand Jury in Illinois indicted Chunlai Yang in a case involving intellectual property infringement (<a title=\"U.S. District Court, 2011, September #413\" href=\"\/Users\/JaneGinn\/Documents\/_Learning\/Norwich\/GI-532\/W6\/03-RGinn-02-Final.doc#_ENREF_14\">U.S. District Court, 2011, September<\/a>).\u00a0 The defendant had been an employee of the CME Group, a company that operated an electronic trading platform called Globex.\u00a0 He had been an employee during which time he routinely copied proprietary source code for his own personal use.\u00a0 He later opened a Chinese language trading platform that closely resembled the business logic of the Globex platform.\u00a0 The plaintiffs successfully prosecuted the case and Yang was ordered to pay compensation to his former company and turn over all corporate assets he had confiscated in the course of his employment (ibid., p.11).<\/p>\n<p>BFSS firms which develop proprietary business processes as account enhancements own these assets.\u00a0 These assets can give them a competitive edge in an industry with thin profit margins. This case offers one example of how case law is evolving in the area of intellectual property protection.<\/p>\n<p><b>Netiquette<\/b><\/p>\n<p>In an interview with the CISO for a major stock brokerage the importance of the readability of the CAUP was emphasized.\u00a0 He stated, \u201c<i>Since policies and awareness of the policies exist to reduce risk by controlling behavior, the workforce needs clear, readable policy language. \u00a0Policy language, style, and tone will vary coordinating to company culture. \u00a0This should be expected, and the content should be reviewed annually<\/i>\u201d (personal communication, January 9, 2013).<\/p>\n<p align=\"center\"><b>Purpose of Communications Acceptable Use Policies<\/b><\/p>\n<p>The importance of a well-crafted CAUP cannot be underestimated.\u00a0 This paper has emphasized the role of legal, regulatory and case law in defining the drivers that will inform the wording of a CAUP.<\/p>\n<p>But beyond the identification of legal, regulatory, and case law drivers discussed in this paper there is the crafting of the metrics used to measure and record compliance.\u00a0 This was emphasized in my interview with the CISO: <i>The area to focus on is the\u00a0compliance measure and associated metrics. \u00a0When implementing any compliance program, 100% compliance is always the goal, but perfection is difficult to obtain. \u00a0So there must be acceptable, marginal, and unacceptable percentages of employees successfully completing the required policy awareness learning module.\u00a0 Start on solid footing and encourage HR to require that employee goal setting\/evaluation include adherence to required modules. <\/i>(personal communication, January 9, 2013).<\/p>\n<p>Two researchers from St. John\u2019s University have recently developed a schema for designing deterrence approaches for using business assets for personal actions (<a title=\"Ugrin, 2008, Winter #418\" href=\"\/Users\/JaneGinn\/Documents\/_Learning\/Norwich\/GI-532\/W6\/03-RGinn-02-Final.doc#_ENREF_15\">Ugrin, 2008, Winter<\/a>). Subsequent work on the development of a comprehensive CAUP should also include discussion of these types of methods for gauging conformance and shaping employee behaviors.<\/p>\n<p align=\"center\"><b>Conclusions<\/b><\/p>\n<p><b>\u00a0<\/b>This paper has emphasized the role of statutes, regulations and case law in the design and development of a comprehensive CAUP.\u00a0 I have illustrated how a clear understanding of the specific issues within each of four areas can help to craft a document that can have the force of law if challenged in court. These are: (1) security; (2) privacy; (3) organizational property; and (4) netiquette.\u00a0 Although legal issues must be dealt with in a clear and concise manner, it is also important that the wording of the CAUP be understandable by all of the employees and\/or contractors subject to its provisions.\u00a0 And, for the CAUP designer, the careful construction of metrics for measuring conformance will be most important for establishing a consistent and enforceable CAUP.\u00a0 The next steps for designing a comprehensive CAUP will be to specify such metrics and measures that correlate specifically to the types of legal considerations outlined in this paper.<\/p>\n<p align=\"center\"><b>References<\/b><\/p>\n<p>Children&#8217;s Online Privacy Protection Act, 15 U.S.C.\u00a0 6501-6506 (Pub. L. 105-277) (1998).<\/p>\n<p>Flowers, B., Rakes, G. (2000). Analyses of acceptable use policies regarding the Internet in selected K-13 schools. <i>Journal of Research on Computing in Education, 32(3)<\/i>, 351-365.<\/p>\n<p>FTC,<i> Standards for safeguarding customer information: Final rule<\/i>, 16 C.F.R. \u00a7 Part 314 (2002, May 23).<\/p>\n<p>Gramm\u2013Leach\u2013Bliley Act [GLBA], Pub.L. No. 106-102, 113 U.S.C., \u00a7 1338 <i>et. seq.<\/i> Stat. (1999, November 12).<\/p>\n<p>Grimm, J. R. (2010, March). Intellectual property crimes. <i>American Criminal Law Review, 47(2)<\/i>.<\/p>\n<p>Kabay, M. E., Kelly, S. (2009). Developing security policies. In S. Bosworth, Kabay, M.E., &amp; Whyne, E. (Ed.), <i>Computer Security Handbook (5th ed.)<\/i>. Hoboken, NJ: John Wiley &amp; Sons, Inc.<\/p>\n<p>Laughton, P. A. (2008, December). Hierarchical analysis of acceptable use policies. <i>InterWord Communications, Vol. 10(4)<\/i>.<\/p>\n<p>Roberts, P. (2012, October). Holes in BYOD: Are your security policies up to the challenge of a bring-your-own-device world? <i>Dark Reading<\/i>. Retrieved from <a href=\"http:\/\/www.darkreading.com\/security\/news\/240008838\/byod-filling-the-holes-in-your-security-policy.html\">http:\/\/www.darkreading.com\/security\/news\/240008838\/byod-filling-the-holes-in-your-security-policy.html<\/a><\/p>\n<p>SANS. (2007).<i> Information security guide: A development guide for large and small companies<\/i>. Information Security Reading Room.<\/p>\n<p>Sarbanes\u2013Oxley Act [SOX], Pub. L. No. 107-204, 116, \u00a7 745 <i>et. seq.<\/i> Stat. (2002, July).<\/p>\n<p>Scott, V., Voss, R. (1994). Ethics and the 7 P&#8217;s of computing use policies. <i>Ethics in Computing Age<\/i>, 61-67.<\/p>\n<p>Shoars v. Epson America, Case No. BC007036, Los Angeles County Superior Court (1994).<\/p>\n<p>Stewart, F. (2002). Internet acceptable use policies: Navigating the management, legal, and technical issues, Ch. 31 <i>The Privacy Papers: Managing Technology, Consumer, Employee, and Legislative Actions<\/i>. Zug, Switzerland: CRC Press, LLC.<\/p>\n<p>U.S. v. Chunlai Yang, Violation: Title 18, U.S.C. \u00a7 1832(a)(2) and (a)(4) C.F.R. (2011, September).<\/p>\n<p>Ugrin, J. C., Pearson, M.J. (2008, Winter). Exploring Internet abuse in the workplace: How can we maximize deterrance efforts? <i>Review of Business, 28(2)<\/i>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Managing employee communications devices in the always-connected global business community has become an important issue for information security personnel engaged in the design of effective security policies. A comprehensive Communications Acceptable Use Policy that addresses each issue systematically and is part of every employment agreement is important for success.<\/p>\n","protected":false},"author":2,"featured_media":3691,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[330,27],"tags":[195,197,198,199,201,202,203,205,206,207,208,210],"class_list":["post-231","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-operations","category-policy","tag-acceptable-use-policy","tag-banking-and-financial-services","tag-communications-devices","tag-comprehensive-communications","tag-effective-security","tag-employee-communications","tag-financial-services-sector","tag-hierarchical-view","tag-intellectual-property-protection","tag-legal-liabilities","tag-malicious-attacks","tag-proper-netiquette"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Managing employee communications devices in the always-connected global business community has become an important issue for information security personnel engaged in the design of effective security policies. A comprehensive Communications Acceptable Use Policy that addresses each issue systematically and is part of every employment agreement is important for success.\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Jane Ginn\"\/>\n\t<link rel=\"canonical\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/02\/07\/communications-acceptable-use-policies-some-cybersecurity-considerations\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"CTIN - Cybersecurity Center\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Communications Acceptable Use Policies: Some Cybersecurity Considerations - CTIN\" \/>\n\t\t<meta property=\"og:description\" content=\"Managing employee communications devices in the always-connected global business community has become an important issue for information security personnel engaged in the design of effective security policies. A comprehensive Communications Acceptable Use Policy that addresses each issue systematically and is part of every employment agreement is important for success.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/02\/07\/communications-acceptable-use-policies-some-cybersecurity-considerations\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"112\" \/>\n\t\t<meta property=\"og:image:height\" content=\"112\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2013-02-07T00:00:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2024-06-23T17:55:29+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Communications Acceptable Use Policies: Some Cybersecurity Considerations - CTIN\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Managing employee communications devices in the always-connected global business community has become an important issue for information security personnel engaged in the design of effective security policies. A comprehensive Communications Acceptable Use Policy that addresses each issue systematically and is part of every employment agreement is important for success.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/02\\\/07\\\/communications-acceptable-use-policies-some-cybersecurity-considerations\\\/#blogposting\",\"name\":\"Communications Acceptable Use Policies: Some Cybersecurity Considerations - CTIN\",\"headline\":\"Communications Acceptable Use Policies: Some Cybersecurity Considerations\",\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2013\\\/02\\\/CTIN-TC_Featured-DataCenter.jpg\",\"width\":1200,\"height\":675,\"caption\":\"Teal data center with workers\"},\"datePublished\":\"2013-02-07T00:00:00+00:00\",\"dateModified\":\"2024-06-23T17:55:29+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/02\\\/07\\\/communications-acceptable-use-policies-some-cybersecurity-considerations\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/02\\\/07\\\/communications-acceptable-use-policies-some-cybersecurity-considerations\\\/#webpage\"},\"articleSection\":\"Operations, Policy, acceptable use policy, banking and financial services, communications devices, comprehensive communications, effective security, employee communications, financial services sector, hierarchical view, intellectual property protection, legal liabilities, malicious attacks, proper netiquette\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/02\\\/07\\\/communications-acceptable-use-policies-some-cybersecurity-considerations\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"position\":2,\"name\":\"Posts\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"name\":\"CyberSecurity\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"position\":3,\"name\":\"CyberSecurity\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/#listItem\",\"name\":\"Policy\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/#listItem\",\"position\":4,\"name\":\"Policy\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/02\\\/07\\\/communications-acceptable-use-policies-some-cybersecurity-considerations\\\/#listItem\",\"name\":\"Communications Acceptable Use Policies: Some Cybersecurity Considerations\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"name\":\"CyberSecurity\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/02\\\/07\\\/communications-acceptable-use-policies-some-cybersecurity-considerations\\\/#listItem\",\"position\":5,\"name\":\"Communications Acceptable Use Policies: Some Cybersecurity Considerations\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/#listItem\",\"name\":\"Policy\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\",\"name\":\"Cyber Threat Intelligence Network\",\"description\":\"Cybersecurity Center\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"telephone\":\"+14804624039\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cropped-cropped-2020-logo.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/02\\\/07\\\/communications-acceptable-use-policies-some-cybersecurity-considerations\\\/#organizationLogo\",\"width\":757,\"height\":237},\"image\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/02\\\/07\\\/communications-acceptable-use-policies-some-cybersecurity-considerations\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CyberThreatIntelligenceNetwork\\\/\",\"https:\\\/\\\/twitter.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/\",\"name\":\"Jane Ginn\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/rjg-PhonePhoto.PNG\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\",\"https:\\\/\\\/infosec.exchange\\\/@ctin\"],\"description\":\"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn\",\"jobTitle\":\"CTIN President & Co-Founder\",\"alumniOf\":[{\"@type\":\"EducationalOrganization\",\"name\":\"Norwich University\",\"sameAs\":\"https:\\\/\\\/online.norwich.edu\\\/online\\\/programs-courses\\\/programs\\\/master-science-cybersecurity\"}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/02\\\/07\\\/communications-acceptable-use-policies-some-cybersecurity-considerations\\\/#webpage\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/02\\\/07\\\/communications-acceptable-use-policies-some-cybersecurity-considerations\\\/\",\"name\":\"Communications Acceptable Use Policies: Some Cybersecurity Considerations - CTIN\",\"description\":\"Managing employee communications devices in the always-connected global business community has become an important issue for information security personnel engaged in the design of effective security policies. A comprehensive Communications Acceptable Use Policy that addresses each issue systematically and is part of every employment agreement is important for success.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/02\\\/07\\\/communications-acceptable-use-policies-some-cybersecurity-considerations\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2013\\\/02\\\/CTIN-TC_Featured-DataCenter.jpg\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/02\\\/07\\\/communications-acceptable-use-policies-some-cybersecurity-considerations\\\/#mainImage\",\"width\":1200,\"height\":675,\"caption\":\"Teal data center with workers\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/02\\\/07\\\/communications-acceptable-use-policies-some-cybersecurity-considerations\\\/#mainImage\"},\"datePublished\":\"2013-02-07T00:00:00+00:00\",\"dateModified\":\"2024-06-23T17:55:29+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"name\":\"Training Center\",\"description\":\"Cybersecurity Center\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Communications Acceptable Use Policies: Some Cybersecurity Considerations - CTIN<\/title>\n\n","aioseo_head_json":{"title":"Communications Acceptable Use Policies: Some Cybersecurity Considerations - CTIN","description":"Managing employee communications devices in the always-connected global business community has become an important issue for information security personnel engaged in the design of effective security policies. A comprehensive Communications Acceptable Use Policy that addresses each issue systematically and is part of every employment agreement is important for success.","canonical_url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/02\/07\/communications-acceptable-use-policies-some-cybersecurity-considerations\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/02\/07\/communications-acceptable-use-policies-some-cybersecurity-considerations\/#blogposting","name":"Communications Acceptable Use Policies: Some Cybersecurity Considerations - CTIN","headline":"Communications Acceptable Use Policies: Some Cybersecurity Considerations","author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2013\/02\/CTIN-TC_Featured-DataCenter.jpg","width":1200,"height":675,"caption":"Teal data center with workers"},"datePublished":"2013-02-07T00:00:00+00:00","dateModified":"2024-06-23T17:55:29+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/02\/07\/communications-acceptable-use-policies-some-cybersecurity-considerations\/#webpage"},"isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/02\/07\/communications-acceptable-use-policies-some-cybersecurity-considerations\/#webpage"},"articleSection":"Operations, Policy, acceptable use policy, banking and financial services, communications devices, comprehensive communications, effective security, employee communications, financial services sector, hierarchical view, intellectual property protection, legal liabilities, malicious attacks, proper netiquette"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/02\/07\/communications-acceptable-use-policies-some-cybersecurity-considerations\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","position":1,"name":"Home","item":"https:\/\/cyberthreatintelligencenetwork.com","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","position":2,"name":"Posts","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","name":"CyberSecurity"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","position":3,"name":"CyberSecurity","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/#listItem","name":"Policy"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/#listItem","position":4,"name":"Policy","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/02\/07\/communications-acceptable-use-policies-some-cybersecurity-considerations\/#listItem","name":"Communications Acceptable Use Policies: Some Cybersecurity Considerations"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","name":"CyberSecurity"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/02\/07\/communications-acceptable-use-policies-some-cybersecurity-considerations\/#listItem","position":5,"name":"Communications Acceptable Use Policies: Some Cybersecurity Considerations","previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/#listItem","name":"Policy"}}]},{"@type":"Organization","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization","name":"Cyber Threat Intelligence Network","description":"Cybersecurity Center","url":"https:\/\/cyberthreatintelligencenetwork.com\/","telephone":"+14804624039","logo":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/01\/cropped-cropped-2020-logo.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/02\/07\/communications-acceptable-use-policies-some-cybersecurity-considerations\/#organizationLogo","width":757,"height":237},"image":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/02\/07\/communications-acceptable-use-policies-some-cybersecurity-considerations\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","https:\/\/twitter.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social"]},{"@type":"Person","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/","name":"Jane Ginn","image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/07\/rjg-PhonePhoto.PNG"},"sameAs":["https:\/\/x.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social","https:\/\/infosec.exchange\/@ctin"],"description":"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn","jobTitle":"CTIN President & Co-Founder","alumniOf":[{"@type":"EducationalOrganization","name":"Norwich University","sameAs":"https:\/\/online.norwich.edu\/online\/programs-courses\/programs\/master-science-cybersecurity"}]},{"@type":"WebPage","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/02\/07\/communications-acceptable-use-policies-some-cybersecurity-considerations\/#webpage","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/02\/07\/communications-acceptable-use-policies-some-cybersecurity-considerations\/","name":"Communications Acceptable Use Policies: Some Cybersecurity Considerations - CTIN","description":"Managing employee communications devices in the always-connected global business community has become an important issue for information security personnel engaged in the design of effective security policies. A comprehensive Communications Acceptable Use Policy that addresses each issue systematically and is part of every employment agreement is important for success.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website"},"breadcrumb":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/02\/07\/communications-acceptable-use-policies-some-cybersecurity-considerations\/#breadcrumblist"},"author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"creator":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2013\/02\/CTIN-TC_Featured-DataCenter.jpg","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/02\/07\/communications-acceptable-use-policies-some-cybersecurity-considerations\/#mainImage","width":1200,"height":675,"caption":"Teal data center with workers"},"primaryImageOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/02\/07\/communications-acceptable-use-policies-some-cybersecurity-considerations\/#mainImage"},"datePublished":"2013-02-07T00:00:00+00:00","dateModified":"2024-06-23T17:55:29+00:00"},{"@type":"WebSite","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website","url":"https:\/\/cyberthreatintelligencenetwork.com\/","name":"Training Center","description":"Cybersecurity Center","inLanguage":"en-US","publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"}}]},"og:locale":"en_US","og:site_name":"CTIN - Cybersecurity Center","og:type":"article","og:title":"Communications Acceptable Use Policies: Some Cybersecurity Considerations - CTIN","og:description":"Managing employee communications devices in the always-connected global business community has become an important issue for information security personnel engaged in the design of effective security policies. A comprehensive Communications Acceptable Use Policy that addresses each issue systematically and is part of every employment agreement is important for success.","og:url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/02\/07\/communications-acceptable-use-policies-some-cybersecurity-considerations\/","og:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:secure_url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:width":112,"og:image:height":112,"article:published_time":"2013-02-07T00:00:00+00:00","article:modified_time":"2024-06-23T17:55:29+00:00","article:publisher":"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","twitter:card":"summary","twitter:site":"@CTIN_Global","twitter:title":"Communications Acceptable Use Policies: Some Cybersecurity Considerations - CTIN","twitter:description":"Managing employee communications devices in the always-connected global business community has become an important issue for information security personnel engaged in the design of effective security policies. A comprehensive Communications Acceptable Use Policy that addresses each issue systematically and is part of every employment agreement is important for success.","twitter:creator":"@CTIN_Global","twitter:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png"},"aioseo_meta_data":{"post_id":"231","title":null,"description":null,"keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":null,"schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-08-25 22:19:14","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2021-08-07 21:52:25","updated":"2025-08-25 22:19:14"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/\" title=\"Posts\">Posts<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/\" title=\"CyberSecurity\">CyberSecurity<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/\" title=\"Policy\">Policy<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tCommunications Acceptable Use Policies: Some Cybersecurity Considerations\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/cyberthreatintelligencenetwork.com"},{"label":"Posts","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/"},{"label":"CyberSecurity","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/"},{"label":"Policy","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/"},{"label":"Communications Acceptable Use Policies: Some Cybersecurity Considerations","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/02\/07\/communications-acceptable-use-policies-some-cybersecurity-considerations\/"}],"amp_enabled":false,"_links":{"self":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/231","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/comments?post=231"}],"version-history":[{"count":6,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/231\/revisions"}],"predecessor-version":[{"id":4411,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/231\/revisions\/4411"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media\/3691"}],"wp:attachment":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media?parent=231"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/categories?post=231"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/tags?post=231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}