One moment please... Acceptable Use Policy | Havoc Shield
Select Page

Acceptable Use Policy

{Company name as you\’d like it to appear in your policy:6} Acceptable Use Policy

Last Updated:

Created By:


What is This Policy?

The Acceptable Use Policy lays out key points for everyone at {Company name as you\’d like it to appear in your policy:6} to keep in mind when using IT resources like the network, laptops and collaboration tools.

Key Takeaways

  • You must use strong passwords and keep them secure.
  • We are entrusted with highly sensitive data. Keep it secret and keep it safe!
  • It’s never okay to use your company-issued assets to harass or be disrespectful to others.
  • {Company name as you\’d like it to appear in your policy:6} owns the IT resources you use, and may monitor them. You shouldn’t expect your communications to be private!

Overview, Purpose, and Scope

Effective security is a team effort, which means everybody at {Company name as you\’d like it to appear in your policy:6} has a crucial role to play. One very important aspect of security is how we use IT resources like the network, laptops, and collaboration tools

This policy lays out key points for everyone at {Company name as you\’d like it to appear in your policy:6} to keep in mind when using such resources.  This Acceptable Use Policy applies to everyone who works for {Company name as you\’d like it to appear in your policy:6}, including our employees, contractors, and third parties who use our IT resources.

Roles & Responsibilities

It is the responsibility of every computer user to know these guidelines, and to conduct their activities accordingly. {Company name as you\’d like it to appear in your policy:6} management reviews and approves this policy, but if you identify an issue you should bring it to the attention of your manager.

Employee Requirements

Follow Company Policies

It’s common sense, but we have policies that guide us in achieving our organization’s mission. These are written to help you figure out how to get things done, keep us secure, and serve our customers! It is therefore essential that you follow all company policies at all times.

Strong Passwords

All systems must have a strong password to safeguard the data they contain. What is a strong password? It’s

  • Contains at least 12 characters
  • Contains at least one upper-case letter
  • Contains at least one lower-case letter
  • Contains at least one numerical digits
  • Contains at least one special characters, such as @, #, $
  • Is never revealed to or shared with anyone

If you find a system where you can’t use a strong password, contact your manager immediately.

Use of Company Resources

To do your job, you are provided with a variety of resources, such as a laptop, smartphone, network access, Internet access, and online storage for data. These are not only essential tools, but also potential security risks if you don’t use them appropriately.

Use of Technology Assets

The assets you use to perform work for {Company name as you\’d like it to appear in your policy:6} should be used primarily for your identified job purpose, and protected for their value. The company issues technology assets like smartphones and laptops, as well as resources like Internet access and software.

By using these assets, you agree to keep them safe and secure at all times, and use them only for their intended purposes.

Email Use

Your {Company name as you\’d like it to appear in your policy:6} email address is provided for you to achieve our company’s mission. Limited personal use is permissible, but remember that it’s not your personal email.

Email shall never be used to transmit Internal or Restricted data. If you need to exchange this type of information, a secure file sharing service is required.

Keep Data Confidential

Our customers trust us with their data, and it is vital that we respect that trust and do everything possible to uphold it. Therefore, you should keep the data you use on a daily basis confidential. Ways of doing that include:

  • Keep control of your physical devices, including laptops and smartphones
  • Don’t store company data outside of approved storage locations

Unacceptable Use

First and foremost, use common sense when using company-provided resources. Be courteous and respectful! You should never:

  • Forward junk emails
  • Use excessive bandwidth (e.g. downloading lengthy videos)
  • Steal copyrighted material
  • Harass, bully, show disrespect towards, or interfere with anyone
  • Use IT resources not managed by {Company name as you\’d like it to appear in your policy:6} to access company data

Personal Usage

You {Can employees use IT resources for limited personal use?:14:value} use {Company name as you\’d like it to appear in your policy:6} IT resources for limited personal use, such as checking email, social media, or web browsing. Such use should be reasonable, and it shouldn’t interfere with your assigned job duties or other users.

Monitoring and Privacy

As part of the company’s dedication to security, we may monitor the use of company-issued resources, including network access and hardware such as laptops or smartphones. By using these resources, you agree to this monitoring and acknowledge that use of these resources does not carry any right to privacy.

Enforcement

Any exceptions to this policy must be approved by senior management in writing.

Any user found to have violated this policy will be subject to disciplinary actions, up to and including termination of employment.

You don't have credit card details available. You will be redirected to update payment method page. Click OK to continue.