Internet and Network Usage Policy
Purpose
ACS Technologies Group, Inc. ("ACST") corporate internet and network systems are intended for the purpose of supporting business activities necessary to carry out job functions. All users must follow ACST's Acceptable Use of Information Systems policy and exercise good judgment in using the Internet. Bandwidth, both within the company and in connecting to the Internet, is a shared, finite resource.
Scope and Applicability
This policy applies to all ACST employees, contractors, and service providers.
Personal Use Policy
Anyone using the Internet while working for ACST and using company resources should be aware that the company network creates an audit log which reflects requests for service, for both in-bound and out-bound addresses, and it is periodically reviewed. You should have no expectation of privacy while using company resources.
If you choose to store or transmit personal information such as private keys, credit card numbers, certificates, or make use of Internet "wallets", you do so at your own risk. ACST is not responsible for any loss of information that may be stored in a wallet, or any consequential loss of personal property.
Prohibited Use
While using company resources, please be advised of the following things you're not allowed to do :
Transmit, create, post, store, and/or voluntarily receive any material that is unlawful, offensive, libelous, threatening or harassing. This includes but is not limited to discriminating or harassing comments based on race, national origin, sex, sexual orientation, age, disability, religion, or political beliefs.
Conduct a business enterprise, political activity, engage in any form of intelligence collection from ACST facilities, engage in fraudulent activities, or knowingly disseminating false or otherwise libelous materials.
Unauthorized access of ACST information outside of the scope of your work. This includes reading customer account information, personnel file information, and accessing information that is not needed to do your job.
Misuse, alter, or disclose customer or personnel information without proper authorization. This includes making unauthorized changes to a personnel file or sharing customer or personnel data with people who are not authorized access to it.
Use, transmit, duplicate, and/or voluntarily receive material that infringes on the copyrights, trademarks, trade secrets, or patent rights of any person or organization. Employees should assume that all materials on the Internet are copyright and/or patented, unless specific notices state otherwise.
Any form of illegal gambling.
Enforcement
Any employee found in violation of this policy may be subject to corrective action, up to and including termination of employment. Service Providers found in violation of this policy may be subject to financial penalties, up to and including termination of contract.
Variance Process
Systems/Networks that do not comply may file for a risk acceptance or a variance. In both cases the Chief Ventures Officer must review, document, approve, and manage the exceptions to this policy.