PROHIBITED ACTIVITIES: Company equipment and the Company networks shall not be used to:
1. Browse the Internet or download data for personal use that, in doing so, would interfere with personal job responsibilities or violate any other provisions of this Policy or Electronic Communications and Computer Use Policy in employee handbook. 2. Transmit or convey by e-mail or other form of electronic communication any material that is fraudulent, harassing, embarrassing, sexually explicit, profane, obscene, intimidating, defamatory, likely to be personally offensive (including sexual comments or images, racial slurs, gender specific comments or any comments which would offend someone on the basis of his or her status as a veteran, age, race, sex, sexual orientation, gender identify, religious or political beliefs, national origin or disability) or that is otherwise unlawful or inappropriate. 3. Transmit or convey critical or derogatory statements regarding individual employees, or disciplinary messages. 4. Install software for business or personal use, unless the installation has been previously authorized by a manager (or higher-level employee) of the IT Department or IT authorized information technology personnel in your department or at your property. Periodically, an audit or interrogation of all equipment for installed software may be conducted, and any software and related printed material found that is not included in the then-current inventory of Company software installed on a particular piece of Company equipment may be removed and destroyed. 5. Except as part of a corporate community affairs effort, distribute literature in support of any individual or organization, or solicit, during the user's working time or the working time of the employee being solicited, any other employee to support any individual or organization. 6. Distribute commercial or personal advertisements or promotions. 7. Add intentionally destructive programs (such as viruses, malware, trap doors or self- replicating codes). 8. Send mass mailings or chain letters. 9. Spend excessive amounts of time for personal use, other than for occasional, limited, appropriate personal use which does not interfere with the user's work performance or any other user's work performance, unduly impact on the operation of the Company's computer network, or violate any other provision of this Policy Electronic Communications and Computer Use Policy in employee handbook. 10. Install encryption software without having first obtained written permission from a manager (or higher-level employee) of the IT Department or IT authorized information technology personnel in your department or at your property and having supplied such manager with the relevant passwords and encryption keys. 11. Retain any data or messages for any period longer than that permitted in the Company's document and record retention policies applicable to the user's department.
Page 85
Made with FlippingBook. PDF to flipbook with ease