SCHEDULE 38 - IT AND COMMUNICATIONS SYSTEMS POLICY
1.
ABOUT THIS POLICY
1.1
Our IT and communications systems are intended to promote effective communication and working practices within our organisation. This policy outlines the standards you must observe when using these systems, the circumstances in which we will monitor your use, and the action we will take in respect of breaches of these standards.
1.2
This policy covers all employees, officers, consultants, contractors, casual workers, agency workers and anyone who has access to our IT and communication systems.
1.3
Misuse of IT and communications systems can damage the business and our reputation. Breach of this policy may be dealt with under our Disciplinary Procedure and, in serious cases, may be treated as gross misconduct leading to summary dismissal.
1.4
This policy does not form part of any employee's contract of employment and we may amend it at any time.
2.
EQUIPMENT SECURITY AND PASSWORDS
2.1
You are responsible for the security of the equipment allocated to or used by you, and must not allow it to be used by anyone other than in accordance with this policy.
2.2
You are responsible for the security of any computer terminal used by you. You should lock your terminal or log off when leaving it unattended or on leaving the office, to prevent unauthorised users accessing the system in your absence. Anyone who is not authorised to access our network should only be allowed to use terminals under supervision.
2.3
Desktop PCs and cabling for telephones or computer equipment should not be moved or tampered with without first consulting Management.
2.4
You should use passwords on all IT equipment, particularly items that you take out of the office. You must keep your passwords confidential and change them regularly. You must not use another person's username and password or make available or allow anyone else to log on using your username and password unless authorised by management. On the termination of employment (for any reason) you must provide details of your passwords to management and return any equipment, key fobs or cards. If you have been issued with a laptop, tablet computer, BlackBerry, smartphone or other mobile device, you must ensure that it is kept secure at all times, especially when travelling. Passwords must be used to secure access to data kept on such equipment to ensure that confidential data is protected in the event of loss or theft. You should also be aware that when using equipment away from the workplace, documents may be read by third parties, for example, passengers on public transport.
2.5
3.
SYSTEMS AND DATA SECURITY
3.1
You should not delete, destroy or modify existing systems, programs, information or data (except as authorised in the proper performance of your duties).
3.2
You must not download or install software from external sources without authorisation from Management. This includes software programs, instant messaging programs, screensavers, photos, video clips and music files.
3.3
You must not attach any device or equipment to our systems without authorisation from the IT Department. This includes any USB flash drive, MP3 player, tablet,
149
Made with FlippingBook - Online magazine maker