Authorized ITS members, Incident Response Team members, and the Legal Department will have access to all reports and data if necessary in order to respond to a security incident. Internet Use reports that identify specific users, sites, teams, or devices will only be made available to personnel outside ITS upon written or e-mail request from an authorized Human Resources Representative.
4.3 Internet Use Filtering System
4.3.1 1836 Technologies Personnel shall not access, transmit, upload, download, print, display or otherwise disseminate the following types of material while on the 1836 Technologies Network or while using 1836 Technologies assets:
Adult/sexually explicit and/or obscene images, data, or other material;
Any data capable of being transformed into obscene or indecent images or material
This includes obscene language, pornography, hostile material relating to gender, sex, race, sexual orientation, religious, political convictions, disability or information that would cause or promote incitement of hatred, violence or any other intimidating material that is designed or could be used to cause offence, annoyance, inconvenience, needless anxiety or which would contravene any Trust policy, in particular equal opportunities or harassment, or break any law.
4.3.2 1836 Technologies Personnel cannot:
i. Intentionally circumvent security mechanisms such as cracking passwords, exploiting system vulnerabilities, or using systems in excess of granted privileges;
ii. Intentionally write, compile, copy, propagate, execute, or attempt to introduce any malicious computer code designed to self-replicate, damage, or otherwise hinder the performance of any computer system. Such software may be referred to as malware virus, bacteria, worm, or a Trojan Horse; and
iii. Transmit, upload, post or discuss Personal Identifiable Information (PII), Protected Health Information (PHI), or sensitive Government or 1836 Technologies company data with any third party without prior written authorization; or
Any activity that would violate the laws and regulations of the European Union
Not to be used for any secondary paid employment or voluntary services
Not to be used to run a personal business
4.3.4 The IT Department reserves the right to block access to Internet websites and protocols that are deemed inappropriate for 1836 Technologies’s corporate environment. The following protocols and categories of websites are examples of the type of websites that may be blocked: