rennie group policy manual

MONITORING

To ensure compliance with this policy, the Company may, but is not obligated to, monitor the use of any aspects of the Company’s Systems. Users are advised that they have no expectation of privacy regarding their use of the Company’s Systems.

PERMITTED USE OF THE COMPANY’S SYSTEMS

The Company’s Systems are intended to be used for the Company’s business purposes. The Company’s Systems may be used for User’s personal matters only outside of business hours or during regularly scheduled breaks and provided that such use: (i) does not interfere with the User’s performance of his or her obligations to the Company and (ii) otherwise complies with this Policy. Under no circumstances may the Company’s Systems be used in the conduct of any commercial or other business endeavor that is not directly related to and for the benefit of the Company, and Users may not incur any additional charges, such as in respect of services charged on a time or usage basis, when using the Company’s Systems for personal use.

PROHIBITED USE OF THE COMPANY’S SYSTEMS

Users must not use any portion of the Company’s Systems in furtherance of any illegal, inappropriate, or irresponsible acts. Without limiting the generality of the foregoing, Users must not use the Company’s Systems: (i) to access, store, transmit, copy or distribute any material that could, in any way, be considered fraudulent, sexist, racist, sexually explicit, obscene, threatening, embarrassing, defamatory, or otherwise offensive (ii) to develop, store, or transmit any virus software, time bombs, trojan horses, self-replicating code, worms, or any destructive program, or (iii) for tampering with, hacking, cracking, bugging, or otherwise improperly accessing government or private data.

CONFIDENTIAL INFORMATION AND OTHER SENSITIVE INFORMATION

As a result of their association with the Company’s, Users many have access to confidential information about the Company and its business partners and customers (“Confidential Information”). The Company policies with respect to Confidential Information apply equally in the context of use of the Company’s Systems, including compliance with the Company’s legal obligations to its business partners and customers.

PUBLIC STATEMENTS

A User must not publish statements of other materials that refer to or contain information about, the Company or its affiliates, business partners, or customers or make statements about any third party’s business or products in any electronic communication unless the User has obtained the prior written authorization of Management, or has been directed by Management, to do so.

INTELLECTUAL PROPERTY RIGHTS

Users must not use the Company’s Systems in any manner that infringes the intellectual property rights, including copyright and trademark rights of others. Users must immediately contact Management if they have any questions as to whether a particular activity may infringe a third party’s intellectual property rights. The following are some guidelines regarding third party intellectual property rights: a) Copying, Downloading, and Transmitting Materials – Users may not (i) electronically copy or download third party materials (including graphics, software, media files or data), from the

5

122160001.2 0073499-00001

Made with FlippingBook - professional solution for displaying marketing and sales documents online