Acceptable Use Policy
Acceptable Use Policy
Overview
Information securitys intentions for publishing an Acceptable Use Policy are not to
impose restrictions that are contrary to <Company Name>s established culture of
openness, trust and integrity. Information security is committed to protecting
<Company Name>s employees, partners and the company from illegal or
damaging actions by individuals, either knowingly or unknowingly.
Effective security is a team effort involving the participation and support of every
<Company Name> employee and affiliate who deals with information and/or
information systems. It is the
responsibility of every computer user to know these guidelines, and to conduct their
activities
accordingly.
Purpose
The purpose of this policy is to outline the acceptable use of computer equipment at
<Company Name>. These rules are in place to protect the employee and
<Company Name>. Inappropriate
use exposes <Company Name> to risks including virus attacks, compromise of
network systems
and services, and legal issues.
Scope
This policy applies to the use of information, electronic and computing devices, and
network resources to conduct business or interact with internal networks and
business systems, whether owned or leased by , the employee, or a third party. All
employees, contractors, consultants, temporary, and other workers at <Company
Name> and its subsidiaries are responsible for exercising good judgment regarding
appropriate use of information, electronic devices, and network resources in
accordance with <Company Name> policies and standards, and local laws and
regulation. This policy applies to employees, contractors, consultants, temporaries,
and other workers at <Company Name>, including all personnel affiliated with third
parties. This policy applies to all
equipment that is owned or leased by <Company Name>.
Policy
Unacceptable Use
The following activities are, in general, prohibited. Employees may be exempted
from these restrictions during the course of their legitimate job responsibilities (e.g.,
systems administration staff may have a need to disable the network access of a
host if that host is disrupting production services).
The lists below are by no means exhaustive, but attempt to provide a framework for
activities
which fall into the category of unacceptable use.
Accessing data, a server or an account for any purpose other than conducting
<Company Name> business, even if you have authorized access, is prohibited.
Executing any form of network monitoring which will intercept data not intended for
the employee's host, unless this activity is a part of the employee's normal job/duty.
Interfering with or denying service to any user other than the employee's host (for
example, denial of service attack).
Sending unsolicited email messages, including the sending of "junk mail" or other
advertising material to individuals who did not specifically request such material
(email spam).
Any form of harassment via email, telephone or paging, whether through language,
frequency, or size of messages.
Solicitation of email for any other email address, other than that of the poster's
account, with the intent to harass or to collect replies.
Employees shall not engage in any blogging that may harm or tarnish the image,
reputation and/or goodwill of <Company Name> and/or any of its employees.
Employees are also prohibited from making any discriminatory, disparaging,
defamatory or harassing comments when blogging or otherwise engaging in any
conduct prohibited by <Company Name>s Non-Discrimination and Anti-
Harassment policy.
Apart from following all laws pertaining to the handling and disclosure of
copyrighted or export controlled materials, <Company Name>s trademarks, logos
and any other <Company Name> intellectual property may also not be used in
connection with any blogging activity.
Policy Compliance
Compliance Measurement
The Information security team will verify compliance to this policy through various
methods, including but not limited to, business tool reports, internal and external
audits, and feedback to the policy Owner.
Exceptions
Any exception to the policy must be approved by the Information security team in
advance.
Non-Compliance
An employee found to have violated this policy may be subject to disciplinary
action, up to and
including termination of employment.