General Security Policy




Download 36 Kb.
bet5/6
Sana01.04.2017
Hajmi36 Kb.
#2749
1   2   3   4   5   6

Internet Access Policy


Internet usage is granted for the sole purpose of supporting business activities necessary to carry out job functions. All users must follow the corporate principles regarding resource usage and exercise good judgment in using the Internet. Acceptable use of the Internet for performing job functions includes:



  • Communication between employees and non-employees for business purposes.

  • IT technical support downloading software upgrades and patches.

  • Review of possible vendor web sites for product information.

  • Reference regulatory or technical information.

  • Research.



The company also prohibits the conduct of a business enterprise, political activity, engaging in any form of intelligence collection from clients or business partners, engaging in fraudulent activities, or knowingly disseminating false or otherwise libelous materials.

Other specific activities that are strictly prohibited include but are not limited to:





  • Accessing confidential information that is not within the scope of one's work.

  • Misusing, disclosing without proper authorization, or altering company or personnel information.

  • Any unauthorized, deliberate action that damages or disrupts computing systems or networks, alters their normal performance, or causes them to malfunction regardless of location or duration.

  • Willful or negligent introduction of computer viruses, trojan horses or other destructive programs into company systems or networks or into external systems and networks.

  • Unauthorized decryption or attempt at decryption of any system or user passwords or any other user's encrypted files.

  • Packet sniffing, packet spoofing, or use of any other means to gain unauthorized access to a computing system or network.

  • Use, transmission, duplication, or voluntary receipt of material that infringes on the copyrights, trademarks, trade secrets, or patent rights of any person or organization.

  • Unauthorized downloading of any shareware programs or files for use without authorization in advance from the IT Department and the user's manager.

  • Any conduct that would constitute or encourage a criminal offense, lead to civil liability, or otherwise violate any regulations, local, state, national or international law including without limitations US export control laws and regulations.

  • Deliberate pointing or hyper-linking of the company Web sites to other Internet/WWW sites whose content may be inconsistent with or in violation with the aims or policies of the company.

  • Transmission of any proprietary, confidential, or otherwise sensitive information without the proper controls.

  • Acquisition, storage, dissemination, creation, posting, transmission, or voluntary receipt of any unlawful, offensive, libelous, threatening, harassing material, including but not limited to comments based on race, national origin, sex, sexual orientation, age, disability, religion, or political beliefs.

  • Any ordering (shopping) of items or services on the Internet.

  • Playing of any games.

  • Forwarding of chain letters.

  • Participation in on-line contest, forms of gambling or accepting of promotional gifts.



Download 36 Kb.
1   2   3   4   5   6




Download 36 Kb.