• JDM IT ACCESS REQUEST FORM

  • New Employee Info

    Instructions: The supervisor should complete the top portion (under NEW EMPLOYEE INFO) of this form and mark the check boxes for access/equipment needed and then return it to the IT Department. Please allow 7 business days to setup a new user in the system, allow additional time if new equipment must be purchased. Please send IT the original electronic document with the form fields filled out. Do not print or scan.
  •  - -
  •  
  •  
  •  
  •  
  • Confidentiality and Acceptable Use Agreement:

    This Policy applies to all authorized users (User, Users) of J.L. Carr Enterprises, Inc.

    (Corporations) information systems (Corporations’ Information Systems).

    All Users must adhere to the policies concerning Computer, Email and Internet usage.

    Use of the Internet is permitted and encouraged where such use supports the goals and objectives of the business.

    Users may be held personally liable for damages caused by any violations of this Policy.

    All Users are required to acknowledge receipt and confirm that they have understood and agree to abide by the rules hereunder.

    Internet Acceptable Use

    • Users are expected to use the Internet responsibly and productively. Internet access is limited to work related activities only and personal use is not permitted

    • Work-related activities include research and educational tasks that may be found via the Internet that would help in a User’s role

    Unacceptable uses include, but are not limited to:

    • Attempting to learn the password of another User, or accessing the system using an ID or password belonging to others.

    • Attempting to access information systems or data to which I have not been specifically         granted access.

    • The installation of software such as instant messaging technology is strictly prohibited.

    • Using the Corporations’ Information Systems to:

    • Send emails, or post on the internet, content that is deemed to be:

    • Discriminatory

    • Harassing,

    • Threatening,

    • Sexually explicit, or vulgar

    • defamatory to the company, its products/services, colleagues and/or customers

    • Perpetrate any form of fraud, and/or software, film or music piracy System Access

    • Send or post chain letters, solicitations, or advertisements not related to business purposes or activities

    • Download, copy or use software and electronic files that are copyrighted and unlicensed

    • Hack into websites

    • Introducing malicious software onto the company network and/or jeopardizing the security of the Corporations’ Information Systems

    • Stealing, using, or disclosing someone else's password without authorization

    • Sharing confidential material, trade secrets, or proprietary information outside of the

    Corporations without authorization

    • Passing off personal views as representing those of the Corporations

    Corporations’ Information

    • All Internet data that is composed, transmitted and/or received by Corporations’ Information

    Systems is considered to belong to Corporations and is recognized as part of its official data.

    It is therefore subject to disclosure for legal reasons or to other appropriate third parties.

    Monitoring of Corporations’ Information System

    • The Corporations reserves the right to monitor Internet traffic and monitor and access data that is composed, sent or received through its connections.

    • All sites and downloads may be monitored and/or blocked by Corporations if they are deemed to be harmful and/or not productive to business.

    If an employee is unsure about what constitutes acceptable usage, then he/she should ask

    his/her supervisor further guidance and clarification.

    If a supplier or service provider is unsure about what constitutes acceptable usage, then he/she should ask the Corporations’ employee who arranged for the provision of supplies or services.

    Reporting

    User will report actual or suspected vulnerabilities relating to the confidentiality, integrity or availability of the Corporations’ Data to the Information Security Officer.

    Users will report actual or suspected breaches in the confidentiality, integrity or availability of the Corporations’ Data to the Information Security Officer.

    Compliance

    Users will adhere to all policies, procedures and agreements pertaining to the protection of the Corporations’ Data including this Acceptable Use Agreement.

    Violations

    Any User violating these policies could result in disciplinary and/or legal action leading up to and including termination of employment or status as a supplier or service provider

  • Powered by Jotform SignClear
  • Powered by Jotform SignClear
  •  - -
  • Should be Empty: