Acceptable Use of Information Systems Policy
Purpose
As employees of ACS Technologies Group, Inc. (“ACST”), the Acceptable Use of Information Systems Policy outlines how you are expected to use company resources. Access to computer systems and networks owned or operated by ACST impose certain responsibilities and obligations, including being subject to company policies, local, state, and federal laws.
Acceptable use reflects professionalism, shows restraint in the consumption of shared resources, and is always ethical. It demonstrates respect for intellectual property, ownership of data, system security mechanisms, and individuals' rights to privacy and to freedom from intimidation, harassment, and unwarranted annoyances.
Scope and Applicability
As a general rule, acceptable use means that you should be considerate when sharing resources. Do not monopolize systems, overload networks with excessive data, waste computer time, connect time, disk space, printer paper, manuals, or other resources.
In making acceptable use of resources you must:
use resources only for authorized purposes
access only files and data that are your own, that are publicly available, or you have authorization to access
use only legal versions of copyrighted software in compliance with vendor license requirements
use resources in order to support and further ACST's mission statement as stated in the Employee Handbook
Use of ACST systems and equipment
ACST provides computers, telephones, cellular phones and other technologies to our staff for the purpose of achieving work goals and objectives. These are issued with the expectation that you'll use them responsibly. In addition to these guidelines, staff are expected to understand and follow the Access Control and Monitoring Policy.
Do not modify the hardware issued to you without prior approval. This includes changing batteries or other internal components.
Do not place decals or adhesive stickers on ACST-owned systems and equipment.
Do not modify the local administrator security group membership.
Laptops and Chrome books are issued with one A/C adapter. The company will provide one replacement adapter in case of loss or failure. Any additional adapters are at the expense of the staff member.
Privileges
The use of the ACST owned equipment and access to the Internet is a privilege, not a right. If deemed necessary, ACST may deny, suspend, or revoke specific user access.
Transmissions
The transmission of any material that violates any U.S. federal or state regulation is strictly prohibited. This includes, but is not limited to the transmission of unauthorized copyrighted material, threatening or obscene material, or intellectual property (e.g. trade secrets, source code, plans, financial information, employee and client data). The use of product advertisement or political lobbying is also prohibited and materials used for commercial activities are generally not acceptable. If you are unsure about what is considered appropriate or acceptable material, ask your supervisor.
Netiquette
You are expected to abide by the generally accepted rules of network etiquette. These include, but are not limited to:
Be polite. Your communications should not be abusive to others.
Use appropriate language. Do not swear, use vulgarities, or use any other inappropriate language.
Do not reveal any personal contact information about yourself or others.
Illegal activities are strictly forbidden.
E-mail is not guaranteed to be private. Certain employees operate the servers and have access to all e-mail. Messages relating to or in support of illegal activities may be reported to the authorities.
Do not use the network in any way that disrupts network services for other users.
All communications and information accessible via the network is the private property of ACST.
Non-liability
ACST makes no warranties of any kind, whether expressed or implied, for the services it provides.
ACST will not be responsible for any damages suffered. This includes loss of data resulting from delays, nondeliveries, misdeliveries, or service interruptions caused by negligence, errors, or omissions. Use of any information obtained via ACST is at the user’s own risk. ACST is not responsible for the accuracy or quality of information obtained.
Security
Security on any computer network is a high priority, especially when the system involves many users. If you believe you have identified a security issue on the Internet,notify your supervisor immediately. In turn, your supervisor will notify the network administrator. Do not attempt to login as a system administrator as it will result in the cancellation of your user privileges. Anyone who is identified as a security risk or having a history of problems with other computer systems may be denied access to the Internet, ACST systems, and equipment.
Vandalism or Malicious Intent
Vandalism is defined as any malicious attempt to harm or destroy and includes, but is not limited to, computer hardware, software, data, and network or internet connections belonging to ACST, its employees, customers or vendors. In addition, this includes, but is not limited to, the uploading or creation of computer viruses. Depending upon the intent and degree of vandalism, offenders may lose the use of ACST resources or be terminated.