ACCEPTABLE USE - AUP
The purpose of this document is to establish Company-wide policy for the acceptable use of the Company’s computers and information resources. Information processed, stored or transmitted on the Company’s information systems is the property of the Company unless it is specifically identified as the property of another party.
Standard
- The Company embraces principles of honesty, integrity and respect. The Company expects users of its technology resources to protect employee and customer information and the privacy of others.
- Each User of the Company’s systems is required to be familiar and comply with the Company’s information systems policies and/or standards. Acceptance is assumed if the user accesses, uses, or handles the Company’s IT resources.
- A department may apply and document more stringent procedural requirements than those provided herein as long as they do not conflict with or lower this AUP standard.
User Privacy
- The Company strongly encourages Users to separate work and personal activities. This applies specially to email activity, which is subject to monitoring due to proprietary and customers’ Personally Identifiable Information (PII).
- Users of the Company’s systems should not have any expectation of privacy. Users should be aware that any activity on the Company’s systems may be randomly monitored, logged, and reviewed by approved personnel.
- All documents created, stored, transmitted, or received on the Company’s computers and networks may be subject to inspection by systems administrators.
Users Must
- Use only the Company’s resources for which the User has been authorized.
- Use strong passwords or passphrases.
- Lock devices or log out of sessions when leaving device(s) unattended.20
- Manage and monitor access to their user accounts. If unauthorized activity or account use is suspected, users must report the compromise to the IT Manager and change their password(s) immediately.
- Ensure operating system, security patches and virus protection software is updated.
- Use only authorized applications and operating systems on Company owned devices. That is,
- Users must properly license software and strictly adhere to all licensing provisions and terms of the license.
- Manage all physical access to their Company-provided devices.
Users Must Not
- Share passwords.
- Gain access to or use accounts, privileges or IT resources for which they are not authorized.
- Tamper, modify, or alter any account restrictions or protections placed on their accounts, or connect/gain access to extra Company devices including other computers
- Use their Company email system inappropriately. For example:
- Send email chain letters or mass mailings for purposes other than official Company business.
- Use Company resources to introduce, create, or propagate SPAM, PHISHING email, computer viruses, worms, Trojan horses, or other malicious code.
- Use Company resources as an email relay between non- Company email systems (routing email through Company email systems between two non- Company systems).
- Include or request Sensitive Information be included in unprotected electronic communication (email, instant message, text message, etc.).
- Misrepresent their identity with actions such as email address falsification, social engineering, or device IP address "spoofing,"
- Physically damage or vandalize Company resources.
- Violate copyright laws.
- Eavesdrop on or intercept other Users’ transmissions.
- Attempt to degrade the performance or availability of any system or to deprive authorized User access to any Company resource.
Personal Use
- Company Resources are provided for use in conducting authorized TRIDENT business. All users are prohibited from using these resources for personal gain, illegal activities, or obscene activities.
- Incidental or casual personal use of Company resources is permitted except when such use:
- Is excessive or interferes with the performance of the User's Company responsibilities.
- Results in additional incremental cost or burden to the Company’s resources.
Company Rights
- Action(s) may be taken to maintain Company information system’s integrity and the rights of authorized Users. Company reserves the right to access any TRIDENT owned resources and any non- Company owned resources on Company property, connected to the Company network, or any resource containing Company data. Additionally, this action may be taken if the security of a computer or network system is threatened, misuse of Company resources is suspected, or Company has a legitimate business need to review activity or data. This action will be taken only after obtaining approval from the CEO or an authorized Company officer.
- Company IT resources may not be used for commercial purposes, except as specifically permitted by the CEO.
Misuse of IT Resources
- Users must report all suspected or observed illegal activities to the IT Manager and CEO. Examples include theft, fraud, copyright infringement, hacking, and viewing or distribution of child pornography.
- Abuse of Company systems at other sites through the use of Company resources via remote control systems will be treated as an abuse of Company resources.
SOCIAL MEDIA
This social media policy is intended to outline the importance of the online social media space and to guide your participation in this area, both when you are participating personally, as well as when you are acting on behalf of the Company. The Company encourages all of its employees to explore and engage in social media communities at a level at which they feel comfortable. Approach social media by using sound judgment and common sense. The Company respects the rights of its employees to use blogs and other social media tools not only as a form of self‐expression, but also as a means to further Company business. It is important that all employees are aware of the implications of engaging in social media and online conversations.
The Company’s Expectations for Employees’ Personal Behavior in Online Social Media
- Let The Company respond to negative posts. You may come across negative or disparaging posts about the Company or see third parties trying to spark negative conversations. Avoid the temptation to react yourself.
- Be conscious when mixing your business and personal lives. The Company respects the free speech rights of all of its employees. It is important to remember that customers, colleagues and supervisors often have access to the online content you post. Keep this in mind when publishing information online. Never disclose any Company information that can be considered proprietary and confidential and be aware that taking public positions online that oppose the Company’s interests may cause conflict.
- You are responsible for your actions. Anything you post that can potentially tarnish the Company’s image will ultimately be your responsibility. We do encourage you to participate in the online social media space, but urge you to do so properly, exercising sound judgment and common sense. The Company will not tolerate harassment or discrimination and social media posts are subject to the Company’s Nondiscrimination, Anti-Harassment Policy. Remember, your responsibility with the Company doesn’t end when you leave the office. For that reason, this policy applies to both Company-sponsored social media and personal use.
COMPANY-ISSUED CELL PHONES
The Company may issue cell phones to employees whose jobs require them to make calls while away from work or require them to be accessible for work-related matters. Cell phones issued by the Company are Company property. Employees must comply with Company requests to make their Company-issued cell phones available for any reason, including upgrades, replacement, or inspection. Employees who damage or lose their Company- issued cell phones are responsible for their replacement. Employees who leave the Company for any reason must turn in their Company-issued cell phones. The cost of any damages may be deducted from the Employee’s last paycheck.
Employees are responsible for the security of Company-issued cell phones and the information stored on them. Always keep your cell phone with you when traveling. If the cell phone is lost or stolen, notify the IT department immediately. Never store confidential Company information on a cell phone. When using a cell phone, remember that your conversations are not necessarily private. To protect the confidentiality of Company information, please make calls in a private place.
Comments
0 comments
Please sign in to leave a comment.