Вы находитесь на странице: 1из 1

POLICY ON THE USE OF INFORMATION TECHNOLOGY

____________________________________________________________________________________
GENERAL USE SYSTEM AND SOFTWARE INTEGRITY
- You are provided access to the Company’s Because of copyright and virus concerns, and to comply
computers, software, telephones, cellular phones, with software licensing requirements, you must have prior
photocopiers, fax machines and other Company written approval from supervisory management to
technology, including e-mail, voice-mail and Internet perform any of the following unless such action is directly
connectivity, for business purposes. related to performing your legitimate assigned duties:
- Disable or uninstall anti-virus software.
- Personal use of these systems is permitted, - Download from the Internet.
provided that it does not violate Company policy or - Install personal software on any Company
interfere with Company business. Use does NOT computer.
include conducting outside business or furthering - Install Company software on any home
personal financial gain. computer.
- Install or duplicate software.
- You are STRICTLY PROHIBITED from
knowingly using, sending, receiving, printing, NOTICE
copying or otherwise disseminating, obscene, racist, - You are responsible for keeping your passwords
sexist or otherwise offensive material in any form. secure and are accountable for the use of Company
technology by anyone you permit to use your
- You are STRICTLY PROHIBITED from passwords. Permitting others access to your
deliberately performing any act that may seriously passwords is discouraged.
affect the operations of Company systems, are
wasteful of computing resources or that may cause - The Company reserves the right to monitor any
embarrassment to, or be adverse to the interests of, and all of your communications, including e-mail,
the Company. voice-mail and Internet connectivity, to ensure
compliance with the Company’s policies and
CONFIDENTIALITY standards. Monitoring can occur at any time, with or
- You are STRICTLY PROHIBITED from without prior notification. Information so obtained
accessing or disseminating proprietary data, trade may be used to document misconduct or criminal
secrets or other confidential Company information for activity, and may be disclosed.
any uses other than those directly related to
performing your legitimate assigned duties. - Violation by you of the Company’s policies,
including policies relating to the use of information
- In the United States, the Company EXPRESSLY technology, is grounds for disciplinary action,
PROHIBITS accessing, or disseminating, personal including termination.
information in violation of any state or federal law,
including, but not limited to, the Fair Credit reporting - The Company reserves the right to amend its
Act of 1997, as amended. policies at anytime.

- Outside the United States, the Company - Any violation of the Company’s policies relating
EXPRESSLY PROHIBITS accessing, or to the use of information technology, or password
disseminating, personal information in violation of security, must be reported immediately to the
any local, regional, provincial or national law. appropriate IT management.
_____________________________________________
- To ensure security, primary passwords may not
be preprogrammed and all primary computer EMPLOYEE CERTIFICATION
passwords must be at least six characters and changed I have read the Policy On The use Of Information
not less than every 90 days. Technology and understand my responsibility to
comply with the principles thereof. I will abide by
- Users of cellular, portable telephones and the this policy at all times and will consult with the
Internet should be aware that these are not secure designated person if I have questions concerning this
communication channels and should act accordingly. policy.
Confidential information sent via Internet e-mail or
stored on portable computers should be protected by
password or encryption.
Signature of Employee
PROCEDURE
Each salaried employee and each hourly employee with Type or Printed Name of Employee
access to the Company’s Information Technology
resources is required to execute the Policy On The Use Of Position or Title
Information Technology Agreement (the “IT Agreement”).
Employees should sign the IT Agreement at the time of
their hire and annually thereafter. The original signed IT Date
Agreement shall be kept in the employee’s personnel or
payroll file. Witness-Supervisor

Вам также может понравиться