INFORMATION TECHNOLOGY & SECURITY POLICY STATEMENT
The computers and all other electronic equipment within the company use which are owned by the company are intended for use in the operations only. Also, all information contained in the electronic equipment belongs to the company and may not be distributed further.
To maintain a good IT environment, we have the following guidelines
The computers and all other electronic equipment within the company use which are owned by the company are intended for use in the operations only. Also, all information contained in the electronic equipment belongs to the company and may not be distributed further.
To maintain a good IT environment, we have the following guidelines
INTERNET USE:
- The use of internet on a computer owned by the company shall be in the purpose of collecting information concerning the line of work.
- Internet should be used with common sense and good judgment by all the employees.
- To download music, films, software or images to the company computers is strictly forbidden. However, exceptions may be made when images are needed on behalf of the work.
- To visit websites whose contents are against the company ethic rules is strictly forbidden. This means websites of racist, pornographic or politically extreme contents.
INFORMATION CONTROL
- Images or movies taken on our work, our employees or our operational areas may not be published in public places such as Facebook, Twitter or YouTube. PRIOR WRITTEN permission from concern authority (General Manaqer / IT Administrator) must be taken.
- Information received from the company or our clients may not be distributed further or published in public places such as Facebook, Twitter or YouTube.
PRIOR WRITTEN permission from concern authority (General Manaqer / IT Administrator) must be taken.
- Using other employee's IT Assets is strictly prohibited.
PRIOR WRITTEN permission from concern authority (General Manaqer / IT Administrator).
SECURITY POLICY
- Company's surplus or obsolete IT assets and resources (i.e. desktop computers, servers, etc.) must be discarded according to legal requirements and environmental regulations through the appropriate external agents and Company's upgrade guidelines.
Legal
- Individuals involved may be held liable for:
- Sending or forwarding e-mails with any libelous, defamatory, offensive, racist, or obscene remarks
- Sending or forwarding confidential information without permission
- Knowingly sending or forwarding an attachment that contains a virus
Incoming Emails:
- Incoming email must be treated with the utmost care due to the inherent information security risks.
- Anti-spoofing practices have been initiated for detecting spoofed emails. Employees should be diligent in identifying a spoofed email. If email spoofing has occurred, IT must be immediately notified.
Outgoing Emails:
- E-mail is to be used for business purposes and in a manner that is consistent with other forms of professional business communication. The following activities are prohibited by policy:
- Sending e-mail that may be deemed intimidating, harassing, or offensive. This includes, but is not limited to: abusive language, sexually explicit remarks or pictures, profanities, defamatory or discriminatory remarks regarding race, creed, color, sex, age, religion, sexual orientation, national origin, or disability.
- Using e-måil for conducting personal business.
- Using e-mail for the purposes of sending SPAM or other unauthorized solicitations.
- Violating copyright laws by illegally distributing protected works.
- Sending e-mail using another person's e-mail account, except when authorized to send messages for another while serving in an administrative support role.
- Forging or attempting to forge e-mail messages. Using unauthorized e-mail software.
- Knowingly disabling the automatic scanning of attachments on any Company computer.
- Knowingly circumventing e-mail security measures.
- Sending or forwarding joke e-mails, chain letters, or hoax letters.
- Sending unsolicited messages to large groups, except as required to conduct Company business. o Sending excessively large messages or attachments.
- Knowingly sending or forwarding email with computer viruses.
FIREWALL:
- All network firewalls, installed and implemented, must conform to the current standards as determined by Company's IT Department. Unauthorized or nonstandard equipment is subject to immediate removal, confiscation, and/or termination of network connectivity without notice.
MEASURES TO BE TAKEN WHEN THIS POLICY IS VIOLATED
- All employees are responsible for reporting every suspected violation of this policy to the Departmental Manager and IT Administrator. A serious violation may lead to compensation claims and dismissal, and if the violation is very serious, the result may be a report to the police and prosecution.
ANTI-RETALIATION POLICY
- Retaliation against individuals for reporting violations of this policy will not be tolerated. If you believe you are being retaliated against, immediately report it to General Manager / IT Administrator.