Chapter 16

1: How does listing specific examples of violations make an acceptable usage policy more effective?
A1: Listing specific examples of the most common violations indicates to potential violators of your acceptable usage policy that you are aware of those actions and will be specifically looking for them. Also, examples can help expand the user's understanding of prohibited types of usage, to help eliminate any question regarding whether a particular activity violates the policy.
2: Why should the list of prohibited activities in an acceptable usage policy be left open-ended?
A2: The list of prohibited activities should be left open-ended because you do not want to limit your policy to specific activities. Users may come up with unacceptable ...

Get Unix® System Management Primer Plus now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.