Suneratech-Acceptable Usage Policy Version - 1.0

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Suneratech- Acceptable Usage Policy

Version- 1.0

Prepared By: Information Technology Manager


Approved By: Chief Information Security officer and Head - IT
Date: 07-08-2019

Document Revision History

PUBLICATION DATE AUTHOR REVISION NO CHANGE DESCRIPTION


Information Technology 1.0 Initial Version
Manager
Confidentiality The data contained herein shall not be disclosed, duplicated, or used in whole or
Statement in part for any purpose other than to evaluate the proposal, provided that if a
contract is awarded to this offer as a result of, or in connection with, the
submission of these data, the propose shall have the right to duplicate, use or
disclose the data to the extent provided in the agreement. The restriction does
not limit the right to use information contained in the data if it is obtained from
another source without restriction.

Security The information contained herein is proprietary to Sunera Technologies and may
Statement not be used, reproduced or disclosed to others except as specifically permitted
in writing by Sunera Technologies. The recipient of this document, by its
retention and use, agrees to protect the same and the information contained
therein from loss or theft.

Suneratech
Contacts

Document Control

Title: Acceptable Usage Policy


Document No
L1 005
Revision Status
1.0 (Initial Version)
Effective Date

Last Review Date


N/A (Initial Version)
Approved by
Chief Information Security Officer and Head - IT
Author Name Information Technology Manager

Signature

Date

Internal Use Only


2
Contents

1. PURPOSE 4

2. SCOPE 4

3. ROLES AND RESPONSIBILITIES 4

4. EXCEPTIONS 4

5. ACCEPTABLE USE POLICY 4


5.1. E-MAIL USAGE 4
5.2. COMPUTER RESOURCE USAGE 4
5.3. INTERNET USAGE 5
5.4. CLEAN DESK AND CLEAR SCREEN 5
5.5. GENERAL 5
5.6. PUNITIVE ACTION 5

Internal Use Only


3
The purpose for publishing an Acceptable Use Policy is not to impose restrictions that are contrary to
Sunera Technologies Inc herein after called as Suneratech, established culture of openness, trust and
integrity. On the contrary, it shall serve to protect the employee of Suneratech. The policy outlines
the acceptable use of information asset at Suneratech. Inappropriate use could expose Suneratech to
risks that could lead to loss of revenue due to loss in productivity and/or loss of business. It could also
expose the employees and Suneratech to legal issues

This policy applies to all employees (part time or full time, temporary or permanent, service providers
with in-house engineers or consultants, contractors) and other workers at Suneratech, including all
personnel affiliated with third parties.

Any exceptions to the acceptable use policy shall be reviewed and approved by the Chief Information
Security Officer.

5.1. E-MAIL USAGE


Suneratech shall ensure the following:

• E-mail system shall be used for business purpose only


• Each employee is responsible for the content of his/her e-mail
• Attachments from an unknown source shall not be opened by the employees of Suneratech
• Suneratech employees shall not forward any hoax e-mails or attachments
• Sensitive information such as customer’s PII, credit card numbers, social security number,
passwords, etc. shall not be sent via e-mail

5.2. COMPUTER RESOURCE USAGE


Suneratech shall ensure the following:

• Internet shall not be accessed for personal use from any computer at any time

Internal Use Only


4
• Anti-Virus settings shall not be changed
• Other employee’s Password/ID shall not be shared or used
• Password shall be set in accordance with Suneratech’s Password Protection Policy
• Authorized applications shall be used only
• Computers shall be logged off / shut down when not in use
• Screen Saver passwords shall be used

5.3. INTERNET USAGE


• Access to Internet shall not be allowed for personal use from any computer at any time
• Users are prohibited from visiting Job/Job search sites except for job sites specified by HR head
from time to time
• All web downloads including but not limited to freeware, shareware, demo software, utilities,
screensavers, games, wallpapers are prohibited. Downloads such as patches and fixes,
Application and OS updates, must be authorized by the IT team and must be screened for viruses
and Trojans
• Do not use any form of Internet Chat from workstation
• Downloading any file or attachment of size above 1 Gigabyte from the Internet is prohibited.
• No access to social networking websites from business workstation

5.4. CLEAN DESK AND CLEAR SCREEN


• Paper shall not be left unattended and paper shall be shredded if it is of no use
• Paper and computer media shall be stored in suitable locked cabinets and/or other forms of
security furniture when not in use and even after hours
• Sensitive or critical business information shall be locked away when not required, especially when
the office is vacated. Personal computers, computer terminals and printers shall not be left logged
on when unattended.
• Photocopiers shall be locked (or protected from unauthorized use) outside normal working hours
• Sensitive or classified information, when printed, shall be cleared from printers immediately

5.5. GENERAL
• Handle all Suneratech equipment and infrastructure with due care and attention
• Not to take out any equipment belonging to the Suneratech without the written permission of
the Department Head
• Not to get any equipment into the Suneratech premises without the written permission of the
Function Head
• Not to permit any outside person into the Suneratech premises or allow access to any
computer/equipment in premises without the written permission of the Department Head
• Tailgating to be avoided
• Do not access restricted areas
• Not to disclose company / customer sensitive information to anyone
5.6. PUNITIVE ACTION
• Any damage to Suneratech resulting from negligence of responsibility will be taken very seriously.
The punitive action could include immediate termination of employment and the employee could
be subject to liabilities resulting from their action. Hence each employee is required to exercise
complete caution and take the assistance of the Project / Department Head / Information Security
Team in case of any doubt.

Internal Use Only


5
6.1REFERENCES WITH CONTROLS

ISO 27001 A.8.1.3


NIST 800-53 PL-4
NIST 800-171 -

6.2 REFERENCES WITH POLICIES


1) L1 003 ISMS Suneratech - Information Security Policy
2) L2 010 ISMS Suneratech - Asset Management Procedure
3) L1 007 ISMS Suneratech - E-mail Security Policy
4) L1 006 ISMS Suneratech - Social Media Policy
5) 1 012 ISMS Suneratech - Mobile Device Management Policy

Internal Use Only


6
AMERICAS | ASIA | EUROPE

© 2019. All rights reserved. Suneratech and all other related logos are either
registered trademarks of Sunera Technologies in the United States, and/or other
countries.

All other company and service names are the proprietary of their respective
holders and may be registered trademarks or trademarks in the United States
and/or other countries.

Internal Use Only


7

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy