Acceptable Computer Use Policy
Acceptable Computer Use Policy
SarchJune, 2015
PRIVILEGES
1) Access to the Company’s computer resources is a revocable privilege which requires that
users act responsibly and in a manner consistent with the provisions of this Policy.
2) Users do not own accounts on Company computers, but rather are granted the use of such
accounts. The Company owns the account and grants individuals a revocable privilege to use
it.
RESPONSIBILITIES
1) As a condition of the privilege of using the Company’s computer resources, each user will be
held accountable for his or her own actions which affect such resources.
2) Users shall report illegal, inappropriate or unauthorized use of the network to the company
President or his designee.
3) Company computers and networks are to be used only for the performance of job duties and
related tasks, such as research, distribution of information, and administrative activities.
Users are required to use the Company’s computer resources, including hardware, software,
networks, and computer accounts in accordance with this Policy and in respect of the rights
of other computer resource users.
4) Users shall not attempt to modify any system or network or attempt to crash or hack into
Company systems. They shall not tamper with any software protections or restrictions
placed on computer applications or files. Unless properly authorized, users shall not attempt
to access restricted portions of any operating system or security software. Nor shall users
attempt to remove existing software or add their own personal software to Company
computers and systems unless properly authorized.
5) Users shall use only their own designated computer accounts. Users are required to keep all
IDs, passwords, and account information confidential, and shall take reasonable precautions
to prevent others from obtaining this information. (It is recommended that users change their
passwords periodically to prevent unauthorized use of their account). Accounts are not
1
COMPUTER USE POLICY
SarchJune, 2015
transferable, and users shall not allow others to use their own account.
Users will be responsible for any use of their accounts by others to whom access has been
given.
6) Users shall not use another individual’s ID, password or account. Users shall respect the
privacy and personal rights of others, and are prohibited from accessing or copying another
user’s E-mail, data, or other files without the prior express consent of that user. Users shall
send E-mail only from their own personal E-mail addresses. Users are prohibited from
concealing or misrepresenting their identity while using the Company’s computer resources.
7) Users are responsible for using software and electronic materials in accordance with
copyright and licensing restrictions. Users are required to abide by all applicable copyright
and trademark laws, and to abide by all licensing agreements and restrictions. Users shall not
copy, transfer, or utilize any software or electronic materials in violation of such copyright,
trademark and/or licensing agreements. The copying of software that has not been placed in
the public domain and distributed as “freeware” is expressly prohibited by this policy. Users
who access, copy, transfer and/or use “shareware” are expected to abide by the requirements
of the shareware licensing agreement. No user may inspect, change, alter, copy, or distribute
proprietary data, programs, files, disks or software without proper authority.
8) Courtesy and etiquette which govern vocal and written communications extends to electronic
communications as well. Fraudulent, harassing, threatening, or obscene messages and/or
other materials must not be transmitted through the Company’s computer resources.
NO RIGHT TO PRIVACY
1) The Company’s computer resources and all users’ accounts are the property of the Company.
There is no right to privacy in the contents of the Company’s computer resources, including
users’ email accounts, nor in the contents of any personal device connected to the Company’s
network. The Company reserves the right to monitor and access information on its computer
equipment or any other device connected to its network system, as well as users’ accounts for
the purpose of determining whether a violation of this Policy has occurred or for any other
reason. No use of passwords shall serve to create an expectation of privacy. The Company
may remove any information which it determines to be in violation of this Policy.
2) The Company may access information contained on its computer resources under numerous
circumstances, including, but not limited to, the following circumstances:
(a) The Company will cooperate appropriately, upon the advice of legal counsel,
with any local, state, or federal officials investigating an alleged crime
committed by an individual affiliated with a Company computer resource, and
may release information to such officials without the knowledge or consent of
the user.
2
COMPUTER USE POLICY
SarchJune, 2015
3) Users agree to represent themselves according to their true and accurate identities in all
electronic messages, files and transactions at all times.
LIABILITY
The company makes no assurances of any kind, whether expressed or implied, regarding any
Internet service provided. The company will not be responsible for any damages the user suffers.
Use of any information obtained via the Internet is at the user's own risk. The company will not
be responsible for any damages users suffer, including -- but not limited to -- loss of data
resulting from delays or interruptions in service. The company will not be responsible for the
accuracy, nature, or quality of information stored on company diskettes, hard drives, or servers;
nor for the accuracy, nature or quality of information gathered through company provided
Internet access. The company will not be responsible for personal property used to access
company computer or network for company-provided Internet access. The company will not be
responsible for unauthorized financial obligation resulting from company-provided access to the
Internet.
1) While the Company recognizes and respects users’ rights to freedom of speech, such rights
are not absolute. Speech which is fraudulent, libelous, obscene, harassing, or threatening is
not permitted under state or federal law. Users are expressly prohibited from using the
Company’s computer resources to engage in such conduct. Users violating this section will
be subject to revocation of their user accounts, and will be further subject to disciplinary
action up to and including termination, and in appropriate circumstances, a referral for
prosecution for the violation of criminal laws.
2) For purposes of this Policy, the terms “fraud” and “libel” are given their legal meaning as
developed by the courts of this State and of the United States. “Obscenity” means words,
images or sounds which a reasonable person, applying contemporary community standards,
when considering the contents as a whole, would conclude that they appeal to prurient
3
COMPUTER USE POLICY
SarchJune, 2015
MODIFICATION
The company President is authorized to amend or revise Computer Use Policy procedures, as
he/she deems necessary and appropriate consistent with this policy.
All users are required to behave in a responsible, ethical and legal manner as defined by this
policy, and other existing Company policies and guidelines which govern employee conduct.
Since access to the Internet/network is a valuable and limited resource, employees are expected
to place a premium on the quality of use. Taking up valuable bandwidth and access time to
pursue frivolous ends, not consistent with the mission of the Company is prohibited. This
statement represents a guide to the acceptable use of the Company’s computer resources. The
following sections define appropriate and inappropriate use.
4
COMPUTER USE POLICY
SarchJune, 2015
Appropriate Use
Activities deemed to be appropriate uses of Company computing resources include, but are not
necessarily limited to, carrying out Company-related assignments and activities requiring access
to and use of computing facilities and systems, including:
1) Authorized access to and use of computer programs licensed by Company available on stand-
alone and networked computing stations.
2) User access to authorized Company e-mail accounts for the purpose of sending work-related
e-mail communications.
4) Communication with other employees and entities for purposes of performing Company-
related work.
Inappropriate Use
Use of Company’s computer resources for purposes other than those identified under Appropriate
Use is not permitted unless approved by a Company Manager. Users are specifically prohibited
from using the Company’s computer resources in any manner identified in this section.
Users who violate this section of the Policy by engaging in inappropriate use of the Company’s
computer resources shall be subject to revocation or suspension of user privileges, disciplinary
action up to and including termination, and may also be subject to criminal or civil sanctions
permitted by law. Such violations include, but are not limited to:
3) Use of the Company’s computer resources to defraud, threaten, libel, or harass others.
5
COMPUTER USE POLICY
SarchJune, 2015
5) Use of the Company’s computer resources which violate copyrights, trademarks, and/or
license agreements.
6) Use of the Company’s computer resources to violate another’s privacy, including, but not
limited to, accessing or using another user’s account, ID number, password, electronic files,
data, or e-mail.
9) Using Company resources for commercial purposes or personal financial gain, without
written permission from a Company Manager.
10) Sending or storing messages and/or materials with the intent to defraud, harass, defame, or
threaten others.
11) Users shall not send any emails that discriminate against employees by virtue of any
protected classification including race, gender, nationality, religion, and so forth, will be dealt
with according to the harassment policy. These emails are prohibited at Denco.
13) Tampering with any software protections or restrictions placed on computer applications or
files.
14) Knowingly or carelessly introducing any invasive or destructive programs (i.e., viruses,
worms, Trojan Horses) into Company computers or networks.
16) Altering or attempting to alter system software or hardware configurations on either network
systems or local computing devices.
17) Installing unauthorized software programs on Company local computing devices or network
systems and/or using such programs.
18) Ignoring or disobeying policies and procedures established for specific network systems.
6
COMPUTER USE POLICY
SarchJune, 2015
19) Copying system files, utilities and applications that expressly belong to the
Company without written permission from a Company Manager.
20) Accessing internet sites which are “adult-oriented” in nature, or which require the user to be
over the age of 18 years, or which offer gambling services, or which contain obscene content
of any nature.
7
COMPUTER USE POLICY
SarchJune, 2015
I have read the Computer Use Policy and understand its provisions. I understand that use of the
Company’s computer system in any capacity is a privilege and not a right. I understand that I
have absolutely no right to privacy in the contents of any of the Company’s computer systems,
electronic communication devices connected to the Company’s system, ID’s or files, and that any
materials that I have created, saved, downloaded, or erased, including emails, are subject to
search and review by the Company. I accept responsibility for the appropriate use of Company
computer resources, which include all computer systems, network systems, electronic
communication devices, cellular phones, Internet and intranet web site or other data processing
equipment owned by the Company, as well as remote computers, or computer systems when
used to access the Company computer resources, as outlined in the Computer Use Policy. I
understand that use of Company computer resources in violation of the Computer Use Policy
may result in disciplinary action up to and including termination and/or the cancellation or
restriction of user privileges.
______________________________________________________________________________