O'Reilly logo

Securing the Borderless Network: Security for the Web 2.0 World by Tom Gillis

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Acceptable Use Policies

This chapter includes the following topics:

The Inevitable Evolution of AUPs

Gen X/Gen Y “Problem”

“Necessary” Noncompliance

AUPs Versus the Will of the Employees

The rapid consumerization of IT and the growing popularity of mobile devices and interactive Web 2.0 applications are forcing companies to move away from their technological comfort zone and traditional notions of how their employees should go about the business of doing work. And as the line between personal and work computing continues to dissolve, management and IT leadership struggle to create realistic acceptable use policies (AUP) that apply in the Web 2.0 world.

Today’s organizations face a formidable challenge: developing progressive ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required