

For guidelines on encrypting email and documents, go to this company's Awareness Initiative.Ĥ. For guidelines on information classification, see this company's Information Sensitivity Policy. This company recommends that any information that users consider sensitive or vulnerable be encrypted.

In the absence of such policies, Employees should be guided by departmental policies on personal use, and if there is any uncertainty, Employees should consult their supervisor or manager.ģ. Individual departments are responsible for creating guidelines concerning personal use of Internet/Intranet/Extranet systems. Employees are responsible for exercising good judgment regarding the reasonableness of personal use. Because of the need to protect this company's network, management cannot guarantee the confidentiality of information stored on any network device belonging to this company.Ģ. While this company's network administration desires to provide a reasonable level of privacy, users should be aware that the data they create on the corporate systems remains the property of this company. This policy applies to all equipment that is owned or leased by this company.ġ. This policy applies to Employees, contractors, consultants, temporaries, and other workers at this company, including all personnel affiliated with third parties.

Inappropriate use exposes this company to risks including virus attacks, compromise of network systems and services, and legal issues. These rules are in place to protect the Employee and this company. The purpose of this policy is to outline the acceptable use of computer equipment at this company. It is the responsibility of every computer user to know these guidelines, and to conduct their activities accordingly. Effective security is a team effort involving the participation and support of every this company Employee and affiliate who deals with information and/or information systems. Internet/Intranet/Extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, Please review Human Resources policies for further details. This company is committed to protecting this company's Employees, partners and the company from illegal or damaging actions by individuals, either knowingly or unknowingly. Established culture of openness, trust and integrity. This company's intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to this company.
