The IT Law Wiki
No edit summary
Tag: Source edit
 
(4 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Definition ==
+
== Definitions ==
   
 
'''Improper usage''' is
 
'''Improper usage''' is
   
{{Quote|[a]ny [[incident]] resulting from violation of an organization's [[acceptable usage policies]] by an [[authorized user]]. . . .[[NIST Special Publication 800-61]], at 2.</ref>}}
+
{{Quote|[a]ny [[incident]] resulting from violation of an organization's [[acceptable usage policies]] by an [[authorized user]]. . . .<ref>[[NIST Special Publication 800-61]], at 2.</ref>}}
  +
  +
{{Quote|[[incident]]s where a [[user]] violates [[Acceptable use policy|acceptable computing policies]] or rules of behavior. These include [[incident]]s like the [[spillage]] of [[information]] from one [[classification level]] to another.<ref>[[Executive Office of the President]], "Annual Report to Congress: Federal information Security Management Act" 15 (Office of Management and Budget) (Feb. 27, 2015) ([https://www.whitehouse.gov/sites/default/files/omb/assets/egov_docs/final_fy14_fisma_report_02_27_2015.pdf full-text]).</ref>}}
   
 
== References ==
 
== References ==
Line 9: Line 11:
 
[[Category:Security]]
 
[[Category:Security]]
 
[[Category:Definition]]
 
[[Category:Definition]]
  +
[[Category:Cybersecurity]]

Latest revision as of 05:30, 8 June 2021

Definitions[]

Improper usage is

[a]ny incident resulting from violation of an organization's acceptable usage policies by an authorized user. . . .[1]
incidents where a user violates acceptable computing policies or rules of behavior. These include incidents like the spillage of information from one classification level to another.[2]

References[]

  1. NIST Special Publication 800-61, at 2.
  2. Executive Office of the President, "Annual Report to Congress: Federal information Security Management Act" 15 (Office of Management and Budget) (Feb. 27, 2015) (full-text).