You are on page 1of 8

COMPUTER USE POLICY

SarchJune, 2015

As a condition of using the TRANSCONTINEDOWS AND SIDING’s


(Company) computer resources, all users must sign the Computer Use Policy form attached to
this Policy. Use of the Company’s computer resources in violation of this Policy is prohibited,
and can result in revocation of a user’s access to the Company’s computer resources, employee
disciplinary action up to and including termination, and a referral for prosecution to other entities
for violation of federal, state and/or local laws and regulations. These policies defining and
governing acceptable and unacceptable use will apply to anyone who uses any computer system,
network system, Internet or Intranet web site or other data processing equipment owned (i.e. cell
phones, laptops) or operated by the Company, as well as the use of any personally owned remote
computer systems (i.e. cell phones, laptops) when used for Company Use and/or to access
Company computer systems.

PRIVILEGES

1) Access to the Company’s computer resources is a revocable privilege which requires that
users act responsibly and in a manner consistent with the provisions of this Policy.

2) Users do not own accounts on Company computers, but rather are granted the use of such
accounts. The Company owns the account and grants individuals a revocable privilege to use
it.

RESPONSIBILITIES

1) As a condition of the privilege of using the Company’s computer resources, each user will be
held accountable for his or her own actions which affect such resources.

2) Users shall report illegal, inappropriate or unauthorized use of the network to the company
President or his designee.

3) Company computers and networks are to be used only for the performance of job duties and
related tasks, such as research, distribution of information, and administrative activities.
Users are required to use the Company’s computer resources, including hardware, software,
networks, and computer accounts in accordance with this Policy and in respect of the rights
of other computer resource users.

4) Users shall not attempt to modify any system or network or attempt to crash or hack into
Company systems. They shall not tamper with any software protections or restrictions
placed on computer applications or files. Unless properly authorized, users shall not attempt
to access restricted portions of any operating system or security software. Nor shall users
attempt to remove existing software or add their own personal software to Company
computers and systems unless properly authorized.

5) Users shall use only their own designated computer accounts. Users are required to keep all
IDs, passwords, and account information confidential, and shall take reasonable precautions
to prevent others from obtaining this information. (It is recommended that users change their
passwords periodically to prevent unauthorized use of their account). Accounts are not

1
COMPUTER USE POLICY
SarchJune, 2015

transferable, and users shall not allow others to use their own account.
Users will be responsible for any use of their accounts by others to whom access has been
given.

6) Users shall not use another individual’s ID, password or account. Users shall respect the
privacy and personal rights of others, and are prohibited from accessing or copying another
user’s E-mail, data, or other files without the prior express consent of that user. Users shall
send E-mail only from their own personal E-mail addresses. Users are prohibited from
concealing or misrepresenting their identity while using the Company’s computer resources.

7) Users are responsible for using software and electronic materials in accordance with
copyright and licensing restrictions. Users are required to abide by all applicable copyright
and trademark laws, and to abide by all licensing agreements and restrictions. Users shall not
copy, transfer, or utilize any software or electronic materials in violation of such copyright,
trademark and/or licensing agreements. The copying of software that has not been placed in
the public domain and distributed as “freeware” is expressly prohibited by this policy. Users
who access, copy, transfer and/or use “shareware” are expected to abide by the requirements
of the shareware licensing agreement. No user may inspect, change, alter, copy, or distribute
proprietary data, programs, files, disks or software without proper authority.

8) Courtesy and etiquette which govern vocal and written communications extends to electronic
communications as well. Fraudulent, harassing, threatening, or obscene messages and/or
other materials must not be transmitted through the Company’s computer resources.

NO RIGHT TO PRIVACY

1) The Company’s computer resources and all users’ accounts are the property of the Company.
There is no right to privacy in the contents of the Company’s computer resources, including
users’ email accounts, nor in the contents of any personal device connected to the Company’s
network. The Company reserves the right to monitor and access information on its computer
equipment or any other device connected to its network system, as well as users’ accounts for
the purpose of determining whether a violation of this Policy has occurred or for any other
reason. No use of passwords shall serve to create an expectation of privacy. The Company
may remove any information which it determines to be in violation of this Policy.

2) The Company may access information contained on its computer resources under numerous
circumstances, including, but not limited to, the following circumstances:

(a) The Company will cooperate appropriately, upon the advice of legal counsel,
with any local, state, or federal officials investigating an alleged crime
committed by an individual affiliated with a Company computer resource, and
may release information to such officials without the knowledge or consent of
the user.

2
COMPUTER USE POLICY
SarchJune, 2015

(b) The contents of electronic messages may be viewed by the


Company in the course of routine maintenance, or as needed for Company
administrative purposes, including investigation of possible violations of this
policy, or other disciplinary provisions.

(c) The contents of electronic messages may be accessed unlawfully by others


during the course of their transmission. It is therefore impossible for the
Company to ensure the privacy of any e-mail communication. Users sending
confidential or private information should elect other more secure methods of
communication if they wish to ensure privacy.

3) Users agree to represent themselves according to their true and accurate identities in all
electronic messages, files and transactions at all times.

LIABILITY

The company makes no assurances of any kind, whether expressed or implied, regarding any
Internet service provided. The company will not be responsible for any damages the user suffers.
Use of any information obtained via the Internet is at the user's own risk. The company will not
be responsible for any damages users suffer, including -- but not limited to -- loss of data
resulting from delays or interruptions in service. The company will not be responsible for the
accuracy, nature, or quality of information stored on company diskettes, hard drives, or servers;
nor for the accuracy, nature or quality of information gathered through company provided
Internet access. The company will not be responsible for personal property used to access
company computer or network for company-provided Internet access. The company will not be
responsible for unauthorized financial obligation resulting from company-provided access to the
Internet.

LEGAL AND ETHICAL LIMITATIONS ON THE USE OF COMPANY COMPUTER


RESOURCES

1) While the Company recognizes and respects users’ rights to freedom of speech, such rights
are not absolute. Speech which is fraudulent, libelous, obscene, harassing, or threatening is
not permitted under state or federal law. Users are expressly prohibited from using the
Company’s computer resources to engage in such conduct. Users violating this section will
be subject to revocation of their user accounts, and will be further subject to disciplinary
action up to and including termination, and in appropriate circumstances, a referral for
prosecution for the violation of criminal laws.

2) For purposes of this Policy, the terms “fraud” and “libel” are given their legal meaning as
developed by the courts of this State and of the United States. “Obscenity” means words,
images or sounds which a reasonable person, applying contemporary community standards,
when considering the contents as a whole, would conclude that they appeal to prurient

3
COMPUTER USE POLICY
SarchJune, 2015

sexual/physical interests or violently subordinating behavior rather than an


intellectual or communicative purpose, and materials that, taken as a whole regarding their
content and their particular usage or application, lack any redeeming literary, scientific,
political, artistic or social value. “Threatening” means communications which result in an
individual being fearful of imminent bodily harm and/or emotional/mental disruption of
his/her daily life. “Harassing” means to engage in a knowing and willful course of conduct
directed at another which seriously alarms or annoys another, and which serves no legitimate
purpose. In addition, “harassment” shall also mean to subject another to unwelcome sexual
advances, requests for sexual favors, and other verbal, visual or physical conduct of such a
nature which has the purpose or effect of creating an intimidating and/or hostile work
environment, or as otherwise provided pursuant to state and/or federal law. Other conduct
which is prohibited by this Policy is that which would constitute discrimination on the basis
of race, color, religion, sex, gender, national origin, ancestry, physical or mental disability,
age, medical condition, genetic information, marital status, military service, sexual
orientation, or any other classification recognized by state and/or federal law.

MODIFICATION

The company President is authorized to amend or revise Computer Use Policy procedures, as
he/she deems necessary and appropriate consistent with this policy.

USE OF COMPANY COMPUTER RESOURCES

All users are required to behave in a responsible, ethical and legal manner as defined by this
policy, and other existing Company policies and guidelines which govern employee conduct.
Since access to the Internet/network is a valuable and limited resource, employees are expected
to place a premium on the quality of use. Taking up valuable bandwidth and access time to
pursue frivolous ends, not consistent with the mission of the Company is prohibited. This
statement represents a guide to the acceptable use of the Company’s computer resources. The
following sections define appropriate and inappropriate use.

4
COMPUTER USE POLICY
SarchJune, 2015

Appropriate Use

Activities deemed to be appropriate uses of Company computing resources include, but are not
necessarily limited to, carrying out Company-related assignments and activities requiring access
to and use of computing facilities and systems, including:

1) Authorized access to and use of computer programs licensed by Company available on stand-
alone and networked computing stations.

2) User access to authorized Company e-mail accounts for the purpose of sending work-related
e-mail communications.

3) Development of work-related materials. Communication with outside resources for


information and market/product competitive research.

4) Communication with other employees and entities for purposes of performing Company-
related work.

5) Any other administrative communications or activities in direct support of the business


mission.

6) Announcements of new products or services in direct support of the business mission.

7) Incidental Activities (limited). Communication incidental to otherwise acceptable use, except


for illegal or specifically unacceptable use.

8) Communication and exchange for professional development and association, to maintain


currency, or to debate issues in a field or sub field of knowledge, use for professional-
association, or standard activities related to the user's research and business activities.

Inappropriate Use

Use of Company’s computer resources for purposes other than those identified under Appropriate
Use is not permitted unless approved by a Company Manager. Users are specifically prohibited
from using the Company’s computer resources in any manner identified in this section.

Users who violate this section of the Policy by engaging in inappropriate use of the Company’s
computer resources shall be subject to revocation or suspension of user privileges, disciplinary
action up to and including termination, and may also be subject to criminal or civil sanctions
permitted by law. Such violations include, but are not limited to:

1) Destruction or damage to equipment, software, or data belonging to the Company or others.

2) Disruption or unauthorized use of accounts, access codes, or identification numbers.

3) Use of the Company’s computer resources to defraud, threaten, libel, or harass others.

5
COMPUTER USE POLICY
SarchJune, 2015

4) Use of the Company’s computer resources in ways which impede the


computing activities of others. Such activities include, but are not limited to: use of multi-
media, shopping networks and social networking websites, blogs and micro-blogs, wikis,
message boards or other sites where text or pictures may be posted; disrupting another’s use
of computer resources by game playing; sending an excessive number of text messages or e-
mail; making or printing excessive copies of documents, files, data, or programs; or
introducing computer viruses of any type onto the Company’s computer resources.

5) Use of the Company’s computer resources which violate copyrights, trademarks, and/or
license agreements.

6) Use of the Company’s computer resources to violate another’s privacy, including, but not
limited to, accessing or using another user’s account, ID number, password, electronic files,
data, or e-mail.

7) Impersonation of any person or communication under a false or unauthorized name.

8) Solicitation for commercial ventures, outside organizations, or other non-job-related


solicitations.

9) Using Company resources for commercial purposes or personal financial gain, without
written permission from a Company Manager.

10) Sending or storing messages and/or materials with the intent to defraud, harass, defame, or
threaten others.

11) Users shall not send any emails that discriminate against employees by virtue of any
protected classification including race, gender, nationality, religion, and so forth, will be dealt
with according to the harassment policy. These emails are prohibited at Denco.

12) Inappropriate mass mailing, “spamming” or “email bombing.”

13) Tampering with any software protections or restrictions placed on computer applications or
files.

14) Knowingly or carelessly introducing any invasive or destructive programs (i.e., viruses,
worms, Trojan Horses) into Company computers or networks.

15) Attempting to circumvent local or network system security measures.

16) Altering or attempting to alter system software or hardware configurations on either network
systems or local computing devices.

17) Installing unauthorized software programs on Company local computing devices or network
systems and/or using such programs.

18) Ignoring or disobeying policies and procedures established for specific network systems.

6
COMPUTER USE POLICY
SarchJune, 2015

19) Copying system files, utilities and applications that expressly belong to the
Company without written permission from a Company Manager.

20) Accessing internet sites which are “adult-oriented” in nature, or which require the user to be
over the age of 18 years, or which offer gambling services, or which contain obscene content
of any nature.

7
COMPUTER USE POLICY
SarchJune, 2015

I have read the Computer Use Policy and understand its provisions. I understand that use of the
Company’s computer system in any capacity is a privilege and not a right. I understand that I
have absolutely no right to privacy in the contents of any of the Company’s computer systems,
electronic communication devices connected to the Company’s system, ID’s or files, and that any
materials that I have created, saved, downloaded, or erased, including emails, are subject to
search and review by the Company. I accept responsibility for the appropriate use of Company
computer resources, which include all computer systems, network systems, electronic
communication devices, cellular phones, Internet and intranet web site or other data processing
equipment owned by the Company, as well as remote computers, or computer systems when
used to access the Company computer resources, as outlined in the Computer Use Policy. I
understand that use of Company computer resources in violation of the Computer Use Policy
may result in disciplinary action up to and including termination and/or the cancellation or
restriction of user privileges.

______________________________________________________________________________

Employee (PRINT NAME) Signature Date

You might also like