Confidentiality and Acceptable Use Agreement:
This Policy applies to all authorized users (User, Users) of J.L. Carr Enterprises, Inc.
(Corporations) information systems (Corporations’ Information Systems).
All Users must adhere to the policies concerning Computer, Email and Internet usage.
Use of the Internet is permitted and encouraged where such use supports the goals and objectives of the business.
Users may be held personally liable for damages caused by any violations of this Policy.
All Users are required to acknowledge receipt and confirm that they have understood and agree to abide by the rules hereunder.
Internet Acceptable Use
• Users are expected to use the Internet responsibly and productively. Internet access is limited to work related activities only and personal use is not permitted
• Work-related activities include research and educational tasks that may be found via the Internet that would help in a User’s role
Unacceptable uses include, but are not limited to:
• Attempting to learn the password of another User, or accessing the system using an ID or password belonging to others.
• Attempting to access information systems or data to which I have not been specifically granted access.
• The installation of software such as instant messaging technology is strictly prohibited.
• Using the Corporations’ Information Systems to:
• Send emails, or post on the internet, content that is deemed to be:
• Discriminatory
• Harassing,
• Threatening,
• Sexually explicit, or vulgar
• defamatory to the company, its products/services, colleagues and/or customers
• Perpetrate any form of fraud, and/or software, film or music piracy System Access
• Send or post chain letters, solicitations, or advertisements not related to business purposes or activities
• Download, copy or use software and electronic files that are copyrighted and unlicensed
• Hack into websites
• Introducing malicious software onto the company network and/or jeopardizing the security of the Corporations’ Information Systems
• Stealing, using, or disclosing someone else's password without authorization
• Sharing confidential material, trade secrets, or proprietary information outside of the
Corporations without authorization
• Passing off personal views as representing those of the Corporations
Corporations’ Information
• All Internet data that is composed, transmitted and/or received by Corporations’ Information
Systems is considered to belong to Corporations and is recognized as part of its official data.
It is therefore subject to disclosure for legal reasons or to other appropriate third parties.
Monitoring of Corporations’ Information System
• The Corporations reserves the right to monitor Internet traffic and monitor and access data that is composed, sent or received through its connections.
• All sites and downloads may be monitored and/or blocked by Corporations if they are deemed to be harmful and/or not productive to business.
If an employee is unsure about what constitutes acceptable usage, then he/she should ask
his/her supervisor further guidance and clarification.
If a supplier or service provider is unsure about what constitutes acceptable usage, then he/she should ask the Corporations’ employee who arranged for the provision of supplies or services.
Reporting
User will report actual or suspected vulnerabilities relating to the confidentiality, integrity or availability of the Corporations’ Data to the Information Security Officer.
Users will report actual or suspected breaches in the confidentiality, integrity or availability of the Corporations’ Data to the Information Security Officer.
Compliance
Users will adhere to all policies, procedures and agreements pertaining to the protection of the Corporations’ Data including this Acceptable Use Agreement.
Violations
Any User violating these policies could result in disciplinary and/or legal action leading up to and including termination of employment or status as a supplier or service provider