SlideShare a Scribd company logo
INTERNET
USEPOLICY
Contents
General Overview
Guidelines
E.1
E.2
General OverviewL.1
• Company supports the use of the Internet to conduct business by or on behalf of
Company. Because the Internet provides access to a worldwide audience, Company
associates should act at all times as if they are representing Company to the public,
and should preserve Company's system security and protect Company's name and
trademarks.
• Company associates must act responsibly and adhere to all laws and Company
policies when using the Internet to conduct business by or on behalf of the
Company and/or when the Company or its products or services are identified.
• This Policy applies to all business units, Company associates and consultants with
access to the Internet from any computer used to conduct business by or on behalf of
Company (on Company premises or from home or any other location), or under any
circumstances in which Company's name or its products or services are used.
GuidelinesL.2
The Company recognizes that the Internet can be a helpful tool in dealing with family and
other personal matters; however, its use must not interfere with work responsibilities,
conflict with business needs, or violate any Company policy or law.
Company reserves the right at all times to monitor, access and decrypt associates' use
of the Internet, Company property, equipment, phone lines, computers (including disks,
drives, storage media, electronic mail, etc.) and information.
All users are expected to use good judgment when using the Internet. Company
strictly prohibits
 Displaying, uploading, downloading, disseminating, participating in bulletin
board or electronic forum discussions regarding subject matters containing
inappropriate materials or information that may be offensive to others;
GuidelinesL.3
 In accordance with the Company's standards of business conduct, hacking or
other attempts to penetrate non-public systems or any dishonest,
defamatory, fraudulent, immoral, illegal and/or unethical activities; and
 Using Company's name or property or a Company-provided Internet access
ID to conduct business on behalf of an entity other than Company or on
behalf of any individual, including yourself; to represent yourself as someone
else; or to solicit Company associates
 All users must respect Company's, its affiliates' and third parties' intellectual
property rights (patents, copyrights, trademarks, trade secrets, as well as
rights of privacy and publicity) and must take precautions to protect
software, information and data that are owned, licensed or managed by
Company.
 No software, information or data may be used or distributed in a manner that
infringes upon any intellectual property right or violates a license agreement or
jeopardizes Company's trade secrets.
 No one may conduct business by or on behalf of Company with third parties using
personal access accounts or IDs.
 Misuse of Company resources and conduct in violation of Company policy will
result in disciplinary action in accordance with the Company policy, up to and
including termination.
GuidelinesL.3

More Related Content

PDF
Internet usage policy(1)
PPTX
Internet Policy Final Project (Group 6)
PPT
Internet Acceptable Use Policy
PPT
Internet Misuse inside the Company
PPT
Employee Misuse of Internet and Blogosphere
PPT
Acceptable use policy
PPTX
Acceptable use policy
PDF
Risk Insight - Employee Internet Usage at Work
Internet usage policy(1)
Internet Policy Final Project (Group 6)
Internet Acceptable Use Policy
Internet Misuse inside the Company
Employee Misuse of Internet and Blogosphere
Acceptable use policy
Acceptable use policy
Risk Insight - Employee Internet Usage at Work

What's hot (11)

DOCX
It policy (ver 1.0)
PPT
Final powerpoint for social media club program
PDF
Legal and cybersecurity issues in whistleblowing (Panama Papers)
PPT
Module4 policies&procedures-b
PPTX
Internet Liabilities Presentation
PDF
Information Privacy?! (GDPR)
PPTX
Internet Ethics
DOCX
Cyber Defense Team's Security Policy
PPTX
4 2 essentials Internet Usage Policy
PDF
Request to use public cloud
PDF
PriyaHarrackisngh_Portfolio_11_15
It policy (ver 1.0)
Final powerpoint for social media club program
Legal and cybersecurity issues in whistleblowing (Panama Papers)
Module4 policies&procedures-b
Internet Liabilities Presentation
Information Privacy?! (GDPR)
Internet Ethics
Cyber Defense Team's Security Policy
4 2 essentials Internet Usage Policy
Request to use public cloud
PriyaHarrackisngh_Portfolio_11_15
Ad

Similar to Internet usepolicy (20)

DOCX
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx
PDF
Social media policy
PDF
Computer, E-mail and Internet Usage Policy and Procedure
DOCX
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
PPT
Social networking policy
PPT
Presentation1.Ppt Email And Internet
PPT
Email & internet
PPTX
Computer Basics in the Work Place
DOCX
Internet policy
PPTX
MONITORING EMPLOYEES ON NETWORKS
DOC
Order #32788581
PDF
Social Media Policies Ebook
PDF
Socialmediapoliciesebook 091018172250 Phpapp02
PDF
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
PDF
Social Media Policy And Work
PPT
Workplace environment e-mail_and_internet_privacy_at_work
PPT
Social Media: Critical Issues for Employers
DOCX
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
PPTX
Presentation1
KEY
Winter session Ethics presentation
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx
Social media policy
Computer, E-mail and Internet Usage Policy and Procedure
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
Social networking policy
Presentation1.Ppt Email And Internet
Email & internet
Computer Basics in the Work Place
Internet policy
MONITORING EMPLOYEES ON NETWORKS
Order #32788581
Social Media Policies Ebook
Socialmediapoliciesebook 091018172250 Phpapp02
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Social Media Policy And Work
Workplace environment e-mail_and_internet_privacy_at_work
Social Media: Critical Issues for Employers
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
Presentation1
Winter session Ethics presentation
Ad

Recently uploaded (20)

PPTX
Digital Literacy And Online Safety on internet
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
Testing WebRTC applications at scale.pdf
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
innovation process that make everything different.pptx
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
Funds Management Learning Material for Beg
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Digital Literacy And Online Safety on internet
RPKI Status Update, presented by Makito Lay at IDNOG 10
Testing WebRTC applications at scale.pdf
Decoding a Decade: 10 Years of Applied CTI Discipline
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Tenda Login Guide: Access Your Router in 5 Easy Steps
INTERNET------BASICS-------UPDATED PPT PRESENTATION
innovation process that make everything different.pptx
QR Codes Qr codecodecodecodecocodedecodecode
Introuction about WHO-FIC in ICD-10.pptx
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Funds Management Learning Material for Beg
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Design_with_Watersergyerge45hrbgre4top (1).ppt
Triggering QUIC, presented by Geoff Huston at IETF 123
An introduction to the IFRS (ISSB) Stndards.pdf
522797556-Unit-2-Temperature-measurement-1-1.pptx
The New Creative Director: How AI Tools for Social Media Content Creation Are...

Internet usepolicy

  • 3. General OverviewL.1 • Company supports the use of the Internet to conduct business by or on behalf of Company. Because the Internet provides access to a worldwide audience, Company associates should act at all times as if they are representing Company to the public, and should preserve Company's system security and protect Company's name and trademarks. • Company associates must act responsibly and adhere to all laws and Company policies when using the Internet to conduct business by or on behalf of the Company and/or when the Company or its products or services are identified. • This Policy applies to all business units, Company associates and consultants with access to the Internet from any computer used to conduct business by or on behalf of Company (on Company premises or from home or any other location), or under any circumstances in which Company's name or its products or services are used.
  • 4. GuidelinesL.2 The Company recognizes that the Internet can be a helpful tool in dealing with family and other personal matters; however, its use must not interfere with work responsibilities, conflict with business needs, or violate any Company policy or law. Company reserves the right at all times to monitor, access and decrypt associates' use of the Internet, Company property, equipment, phone lines, computers (including disks, drives, storage media, electronic mail, etc.) and information. All users are expected to use good judgment when using the Internet. Company strictly prohibits  Displaying, uploading, downloading, disseminating, participating in bulletin board or electronic forum discussions regarding subject matters containing inappropriate materials or information that may be offensive to others;
  • 5. GuidelinesL.3  In accordance with the Company's standards of business conduct, hacking or other attempts to penetrate non-public systems or any dishonest, defamatory, fraudulent, immoral, illegal and/or unethical activities; and  Using Company's name or property or a Company-provided Internet access ID to conduct business on behalf of an entity other than Company or on behalf of any individual, including yourself; to represent yourself as someone else; or to solicit Company associates  All users must respect Company's, its affiliates' and third parties' intellectual property rights (patents, copyrights, trademarks, trade secrets, as well as rights of privacy and publicity) and must take precautions to protect software, information and data that are owned, licensed or managed by Company.
  • 6.  No software, information or data may be used or distributed in a manner that infringes upon any intellectual property right or violates a license agreement or jeopardizes Company's trade secrets.  No one may conduct business by or on behalf of Company with third parties using personal access accounts or IDs.  Misuse of Company resources and conduct in violation of Company policy will result in disciplinary action in accordance with the Company policy, up to and including termination. GuidelinesL.3