rennie group policy manual

Internet or otherwise, to any part of the Company’s Systems or (ii) send materials created by a third party others unless the Company has obtained permission to do so from the owner of the copyright in such materials. b) Software Licenses – Generally, software may be used only as permitted under the terms of a valid license agreement. Accordingly, Users may use such software, only in accordance with the terms of the applicable licenses agreement. Users may not purchase, download, or install on the Company’s systems any software without prior authorization of Management. c) Trademarks – Users may not use or publicly display the trademark of a third party without first obtaining such party’s permission.

EMAIL

When sending correspondence by email, Users should take the same care and should apply the same standard of accuracy, grammar, courtesy and professionalism, as appropriate for traditional forms of written correspondence. The language used in and all other context contained in electronic communications should be suitable for the particular context in which it is used. Because email and electronic documents attached thereto may contain “meta-data” or other information than, although not readily visible, might be discoverable by the recipients of the email or by any other individuals to whom the email is forwarded, Users should take steps to ensure that unintended information is not included in electronic communications. For example, Users should ensure that hidden comments, tracked changes, hyperlinks, and other meta-data is removed from the documents and that each document is otherwise “scrubbed” to remove confidential information relating to transactions with other business partners or customers. Unless specifically authorized by management, Users shall not make any statement in an email that may imply a position of or bind the Company.

COMBATING SPAM

Users must not use their email address to enter promotions, contests, surveys and others in order to prevent and to minimize Spam from entering into the Company’s Systems.

SECURITY

Users must take steps to ensure the security and integrity of the Company’s Systems includes the following: a) Passwords – Users must maintain the confidentiality of all passwords and other security information, and should not print out, store online, or disclose their passwords except as authorized by the Company’s IT Support Members. b) Logging out – Users must log out of Company’s Systems at the end of each night to reduce the risk of security breach. c) Identity – Users must identify themselves accurately and may not use another person’s identification or password, when logging into, using, or transmitting data through the Company’s Systems and may not access another person’s email or electronic documents without the permission of such person. Users may be held responsible for any correspondence or transaction made using their passwords. d) External Access – Users must not access the Company’s Systems from any unauthorized external system or from any system that may store, cause unauthorized access to or use of, or otherwise compromise the confidentiality of any Confidential Information. e) Mobile Devices – Users must maintain the physical and electronic security of all mobile computing devices that contain any Confidential Information. f) Personal Device s – Users must not install or interface their personal devices (including, without limitation, personal notebooks, wireless access points, and external CD-writers) with the Company’s Systems, without prior approval from the Company. g) Usage – Users must not permit outside personnel to use or to service the Company’s Systems unless authorized by the Company’s IT Department.

6

122160001.2 0073499-00001

Made with FlippingBook - professional solution for displaying marketing and sales documents online