Safety & Risk Control Resources

12. Use e-mail or other form of electronic communication as a communication vehicle for sensitive information, such as Company strategy, unless such communications are part of the associates’ job description, or the associate is authorized by a manager to transmit such communication. 13. Download, copy or distribute software, files, documents, messages (including e- mail messages authored by third parties) and other material from any source (including the Internet) in violation of copyright laws and applicable licenses. 14. Read, alter or copy the files of another user without prior permission or company authorization, or access other computers or networks, by modem or otherwise, without specific authorization of the operators of those systems. 15. Print or store your network log-in password in a public area (or otherwise give it to third parties). 16. Access the Company networks with a non-assigned name or with another user's network log-in password without explicit permission. 17. Open e-mail attachments, download data from the Internet or access files on computer disc, USB drive, or other storage media without an active virus program. 18. Transmit or convey to third parties, without authorization, proprietary data, trade secrets or other confidential information of the Company. 19. Copy software from Company equipment for use on home or other equipment; provide copies of such software to any third-party (including any contractors or clients of the Company); modify, revise, transform, recast or adapt any software, except as permitted; or reverse-engineer, disassemble or decompile any software. 20. Export illegally outside the U.S., or any other country with similar restrictions, any programs or files which contain encryption technology in violation of applicable laws. 21. Access the Internet via service providers such as AOL or AT&T Worldnet from a desktop or laptop computer that is concurrently connected to the Company local area network. 22. Violate any other established Company policies and procedures or legal requirements. Every PC at the user level must be inspected for any suspicious devices connected to its hardware at least once a day. Update Brand Performance Support with any reporting of suspicious activity found. There must be a complete investigation and a report every time that an incident occurs. PRESS INQUIRIES/COMMUNICATIONS/MEDIA: Cyber Attacks on hotels are of great public interest and may attract media attention. Any crisis which might attract media attention must be reported to infosec@atriumhospitality.com, including our Public Relations representative, ahemergencynotification@atriumhospitality.com , and the franchisor Crisis Hotline if applicable, per the instructions at the front of this manual. Contact with the media concerning the Company’s position on any matter should be made only by the Company’s authorized spokespersons. Managers and associates who are not authorized spokespersons but who receive inquiries from the media regarding the Compa ny’s position on a matter are to refer such inquiries to the General Manager who will immediately make the President and SVP-HR, and your VPO,

Page 86

Made with FlippingBook. PDF to flipbook with ease