POL-012.02 Acceptable Use Policy
POL-012.02 Acceptable Use Policy
1 PURPOSE
The purpose of this document is to define the Acceptable Use Policy for Titan Technologies (Titan) .
2 SCOPE
This Acceptable Usage Policy covers the security and use of all Titan information and IT equipment. It
also includes the use of email, Internet, voice and mobile IT equipment.
3 APPLICABILITY
This policy applies to all staff, activities, and assets managed by Titan, including agents, contractors, or
other business partners when acquired or supported by Titan funding. This policy applies to all Titan
employees, contractors, and agents (hereafter referred to as 'individuals'). This policy applies to all
information, in whatever form, relating to Titan business activities worldwide and to all information
handled by Titan relating to other organizations with whom it deals. It also covers all IT and
information communications facilities operated by Titan or on its behalf.
4 DOCUMENT REFERENCES
4.1 PRO-012 Information Security Management Process
4.2 ISO 9001:2015
4.3 ISO 20000:2018
4.4 ISO 27001:2013
4.5 NIST 800-53r5
5 POLICY SUCCESSION
This policy supersedes and replaces all previous versions or policy statements. Where
inconsistencies exist, this policy shall at all times be superseded by applicable federal, state, or local
law.
6 POLICY
6.1 Computer Access Control – Individual's Responsibility
Access to the Titan IT systems is controlled by the user IDs, passwords and/or tokens. All User
IDs and passwords are to be uniquely assigned to named individuals and consequently,
individuals are accountable for all actions on the Titan IT systems. User must not:
Allow anyone else to use their user ID/token and password on any Titan IT system.
Leave their user accounts logged in at an unattended and unlocked computer.
Use someone else's user ID and password to access Titan IT systems.
Leave their password unprotected (for example writing it down).
Perform any unauthorized changes to Titan IT systems or information.
Attempt to access data that they are not authorized to use or access.
To reduce the risk of unauthorized access or loss of information, Titan enforces a clear desk
and screen policy as follows:
It is accepted that laptops and mobile devices will be taken off-site. The following controls
must be applied:
Working away from the office must be in line with Titan Telework Policy.
Equipment and media taken off-site must not be left unattended in public places and not
left in sight in a car.
Laptops must be carried as hand luggage when traveling.
Information should be protected against loss or compromise when working remotely (e.g.,
at home or in public places).
Particular care should be taken using mobile devices such as laptops, mobile phones,
smartphones, and tablets. They must be protected at least by a password, PIN and/or
encryption, if available.
Mobile devices such as memory sticks, CDs, DVDs, and removable hard drives must be used
only in situations when network connectivity is unavailable or there is no other secure method
of transferring data. For most staff the use of external storage devices is prohibited. Only
Titan authorized mobile storage devices with encryption enabled can be used to transmit
sensitive or confidential data.
6.6 Software
Employees must use only approved software on Titan computing devices or on computers
authorized by Titan IT. Authorized software must be used following the software supplier's
licensing agreements. All software on Titan computers must be approved and installed by
Titan. Individuals must not:
Store personal files such as music, video, photographs, or games on Titan IT equipment.
Record, transcribe, or digitally monitor government systems/programs without the
expressed written consent of the government/customer.
Version #: 2.0 Page 3 of 5
Date: 10/08/21 Titan Proprietary Data – For Internal Use Only
This document contains confidential and proprietary information of Titan Technologies. Unauthorized use, reproduction, or distribution is
strictly prohibited. Uncontrolled if printed. Before using this document, the reader is responsible for ensuring that this is the most current
version by comparing it with the online (master) version. Copyright© 2021 by Titan Technologies. All rights reserved.
Acceptable Use Policy
Document Number: POL-012.2
6.7 Viruses
Titan has implemented centralized, automated virus detection and virus software updates
within Titan. All Titan managed endpoints have antivirus software installed to detect and
remove any virus automatically. Individuals must not:
The use of Titan voice equipment is intended for business use. Individuals must limit the use
of Titan voice facilities for sending or receiving private communications on personal matters,
except in exceptional circumstances. Individuals must not:
All Titan equipment and data, for example, laptops and mobile devices including telephones,
smartphones, USB memory devices, badges, and CDs/DVDs, must be returned to Titan at the
termination of employment, unless alternative arrangements are approved by the COO or
CEO. All Titan data or intellectual property developed or gained during the employment
period remains Titan property. It must not be retained beyond the termination or reused for
any other purpose.
All data created and stored on Titan computers are the property of Titan. There is no official
provision for individual data privacy; however, Titan will avoid opening personal emails
whenever possible. IT system logging will occur where appropriate, and investigations will be
commenced where reasonable suspicion exists of a breach of this or any other policy.
Titan has the right (under certain conditions) to monitor activity on its systems, including
Internet and email use, to ensure systems security and effective operation and protect against
misuse. Any monitoring will be carried out following audited, controlled internal processes
and US Law.
It is the responsibility of all Titan staff to report suspected security policy breaches without
delay to line management. All potential violations of information security policies will be
investigated. Where investigations reveal misconduct, disciplinary action may follow in line
with Titan disciplinary procedures.
RECORD OF CHANGES
*A-ADDED, M-MODIFIED, D-DELETED
A* CHANGE
VERSION NUMBER OF FIGURE, TABLE
DATE M TITLE OR BRIEF DESCRIPTION REQUEST
NUMBER OR PARAGRAPH
D NUMBER
0.1 02/22/21 All – Original Document A Original Document N/A
Incorporated review comments from
1.0 02/26/21 All M CR 29
COO and CPO
Modified section 3 to clarify
applicability, Modified section 4 with
2.0 10/08/21 Sections 3, 4, 6.1, 6.2 M corrected references, Modified 6.1 CR 42
and 6.2 to clarify language and
include components from 800-53
2.1 02/07/23 Section 6.6 M Added second bullet CR 56