Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
10 views5 pages

IT Acceptable Use Policy 2

The Information Technology Acceptable Use Policy outlines the guidelines for using the Company's IT systems, including email and internet access, emphasizing the importance of confidentiality and appropriate conduct. Employees are required to adhere to these guidelines, with violations potentially leading to disciplinary action, including termination. The policy also includes provisions for reporting misconduct and clarifies that it does not constitute a contract of employment.

Uploaded by

vlaad.dumitrache
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views5 pages

IT Acceptable Use Policy 2

The Information Technology Acceptable Use Policy outlines the guidelines for using the Company's IT systems, including email and internet access, emphasizing the importance of confidentiality and appropriate conduct. Employees are required to adhere to these guidelines, with violations potentially leading to disciplinary action, including termination. The policy also includes provisions for reporting misconduct and clarifies that it does not constitute a contract of employment.

Uploaded by

vlaad.dumitrache
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Information Technology Acceptable Use Policy

I. Policy
NetCracker Technology Corp. (the “Company”) maintains an information technology system that includes Internet
access and electronic mail (“email”) systems to assist the Company and its employees in the conduct of Company
business. These systems are productive business tools and the Company encourages their use to facilitate internal
and external professional communications.

This policy describes the Company’s guidelines with regard to the use of these systems and access to and disclosure
of email messages sent or received by employees of the Company with use of the Company’s email system. The
Company respects the privacy of its employees. Employees should be aware, however, that the following guidelines
might affect their privacy in the workplace.

All employees must adhere to this Policy. Any breach by an employee of any of the terms of this document will be
treated as a serious disciplinary matter and will prompt disciplinary action up to and including termination of
employment.

II. Eligibility
This policy applies to all activities and locations of the Company and to all employees (for purposes of this policy,
“employees” shall include full time employees, part time employees, temporary and contract employees).

III. Administration
The interpretation and administration of this policy is the responsibility of the IT department.

IV. Company Guidelines


1. All computer user accounts and passwords must not be shared with others. The person to whom an
authorization is assigned will be held accountable for any activity originating from that account. If at any
time an employee suspects that others have knowledge of their password, an IT Administrator should be
notified immediately and a new password created.
2. Information stored within a computer or on a computer diskette is considered confidential, whether or not
protected by security features of the computer system or the computer diskette.
3. Due to computer software or hardware failures, all data, including email messages, may become
accessible to unauthorized employees and the general public. System management personnel may also
have access to such data while performing routine operations. System personnel are required to report
improper or illegal activities they discover. The Company cannot guarantee the complete privacy of its
information technology system and no guarantee is implied by this policy, therefore there may be
circumstances when confidential information should be distributed by means other than email.
4. All computers, email facilities and the data stored on them, including email messages and passwords, are
and remain at all times the property of the Company.
5. Destruction of, unauthorized removal of, or damage to equipment, software, or data belonging to the
Company is prohibited.
6. Modifications or additions to network software, hardware, or wiring should only be performed by
Company authorized personnel.

Internet and Other On-Line Services

1. The Internet and other on-line services and venues are in the public domain where employees’ actions
will reflect on the Company’s office, clients, and the Company itself. Employees should act accordingly.

NetCracker Technology Corporation


IT Acceptable Use Policy
January 2021
2. The Internet and other on-line services and venues are a vital part of the work environment. Behavior that
would be inappropriate in the Company’s workplace is prohibited on-line.
3. Attempting to disguise one’s identity when using the Internet or other on-line services in representing
clients or the Company is prohibited.
4. Employees may not use the Company’s information technology systems to impede, slow down or prevent
communication or the free flow of information on the Internet.
5. Posting or downloading unlawful, offensive or improper material, such as material that may (i) create a
hostile work environment, (ii) be reasonably considered offensive or disruptive to any employee or client,
or (iii) be considered pornographic, is strictly prohibited. Offensive content includes, but is not limited
to, sexual comments or images, racial slurs, gender-specific comments or any comments that would
offend someone on the basis of his or her age, sexual orientation, religious or political beliefs, national
origin, or disability.
6. While employees are encouraged to use Internet resources for accessing useful business related data, the
use of the Internet during business hours for non-business related tasks is prohibited. The Company
reserves the right to block access to Web Sites which are deemed to contain objectionable content and to
audit, monitor and record an identification of the various Internet Sites accessed by an employee using
Company equipment.
7. Downloading software is prohibited unless such software complies with established policies, has been
legally licensed to the Company, and has been checked for computer viruses by authorized technicians of
the Company.

Electronic Mail

1. Email is a written means of communication and, as such, is considered a business record as is any
Company file, correspondence, contract, memorandum, etc. Email messages may be obtained as
evidence against an employee or the Company in the discovery phase of litigation. Employees should not
communicate anything in an email message that they would not state in a written memorandum or letter
using Company letterhead. When composing email messages, employees should avoid casual language
or comments that could create liability or embarrassment and exercise the same level of restraint that one
would in composing ordinary written business correspondence.
2. Employees should ensure that they do not enter into contractual commitments by email without the proper
authorization. Email, like letters and telephone calls, can create binding contracts. Employees should
beware of agreeing to commitments unintentionally and should always seek the correct authorization
where appropriate.
3. Rude or defamatory email is prohibited. The laws of libel that govern all written correspondence also
apply to email.
4. Email is a global medium; therefore the laws governing the country of origin of an email may be different
and may not be enforceable in the country of its destination and vice versa. This may be particularly true
with copyright laws.
5. Email messages should be limited to the conduct of Company business. Incidental and personal use of
the email system is to be kept to a minimum, and any personal messages will be subject to the provisions
of this policy.
6. The Company reserves the right to retrieve and read any email message composed, transmitted, or
received by Company personnel.
7. While the Company’s email system may accommodate the use of passwords for security, the reliability of
such measures for maintaining confidentiality cannot be guaranteed. Privacy of email messages cannot
be assured and employees must assume that someone other than the intended or designated recipient may
2
NetCracker Technology Corporation
IT Acceptable Use Policy
January 2021
read any and all messages. There may be circumstances when confidential information should be
distributed by a means other than email.
8. Deleting an email message or other computer document does not guarantee that it has been erased from
the computer system. An email message or computer file may exist on a backup disk or another storage
device long after the message has been “deleted” and may be accessed or recovered and subject to
discovery in a later litigation.
9. Sending or downloading unlawful, offensive or improper material, such as material that may create a
hostile environment and/or be reasonably considered offensive or disruptive to any employee or client is
strictly prohibited, as is the case with downloading or sending pornographic materials. Offensive content
includes, but is not limited to, sexual comments or images, racial slurs, gender-specific comments or any
comments that would offend someone on the basis of his or her age, sexual orientation, religious or
political beliefs, national origin, or disability.
10. The ability to send or receive messages over the Internet is available within the Company’s email system.
However, if proper precautions are not taken, Internet email may not be a secure means of
communication. Therefore, the email system should not be utilized to communicate trade secrets and
other confidential information of the Company or its clients outside the Company without prior written
permission from a supervisor or department manager.
11. The viewing, copying, accessing or posting of information may constitute a copyright or trade secret
violation. If there is any doubt regarding the copyright or trade secret status of any such information,
employees should refrain from viewing, copying, or posting such information or disseminating it to
others.
12. Email may be forwarded without employees’ knowledge to many other people, including international
locations. An unlawful email may give rise to multiple causes of action (including in foreign
jurisdictions) against employees personally or the Company.
13. Hard copies of email messages which are important or which may need to be retained for record keeping
purposes should always be made. If an email (with or without an attachment) is sent to a client, a copy
should be kept with the client’s file in the same way any other document would be retained. Hard copies
of the following documents should always be printed:

Instructions given or received


Quotations and estimates
Confirmations

14. Always request verbal or written confirmation of receipt of important email messages. Do not rely solely
on email confirmation of receipt.
15. Employees cannot access or attempt to access the email files of another employee without proper
authorization.
16. Employees learning of any flaw in the system or network security shall promptly notify their supervisor
or department manager. Employees are strictly prohibited from creating or exploiting any security lapses.
17. Employees learning of any misuse of the email system or violations of this policy shall promptly notify
their supervisor or department manager. A violation of this Email Policy or any other abuse of the email
system may result in disciplinary action, up to and including termination of employment.

V. Violations

Compliance with this policy is subject to the requirements established for all personnel by the Code of Ethics and Standards
of Conduct. Violations of this policy may result in disciplinary action up to and including termination of employment. All
3
NetCracker Technology Corporation
IT Acceptable Use Policy
January 2021
members of the Netcracker community are encouraged to report possible fraudulent or dishonest conduct. An employee
should report his or her concerns to a supervisor or manager. If, for any reason, an employee finds it difficult to report his or
her concern to a manager or supervisor, questions and suspected violations can be submitted anonymously over the following
channels:
Employees outside of European Union Countries
Ethics Hotline: 1-866-235-1685
Online: https://www.integrity-helpline.com/NetCracker.jsp

Employees in European Union Countries


Ethics Hotline: 1-800-721-0843
Online: https://www.financial-integrity.com /NetCracker.jsp

In addition to the hotlines, employees in any location may submit reports via mail to the Chief Legal Officer & Chief
Compliance Officer, NetCracker Technology Corp., 95 Sawyer Road, University Office Park III, Waltham, MA 02453 or
alternatively to the attention of the Chief People Officer at the same address; reports may also be submitted to either of the
parties mentioned above via electronic mail. To the extent reasonably practicable, identities of those making reports to the
above individuals will be kept confidential.

Managers and supervisors are required to report suspected fraudulent or dishonest conduct to NetCracker’s Global
Compliance & Ethics Committee.

VI. Policy Disclaimer and Severability


The Company reserves the right to modify, amend or terminate this policy, at its sole discretion, at any time, with
or without notice. This policy is not a contract, express or implied, guaranteeing employment or any terms of
employment, for any duration of time. If any part of this policy conflicts with any applicable federal, state or local
law, the applicable law shall supersede this policy. The provisions of this policy shall be severable. If any provision
or portion of this policy or its application to any person or circumstance is held invalid, the remainder of the policy
or the application of the provision to other persons or circumstances shall not be affected.

4
NetCracker Technology Corporation
IT Acceptable Use Policy
January 2021
STATEMENT OF UNDERSTANDING AND COMPLIANCE FOR NETCRACKER TECHNOLOGY CORP.
IT ACCEPTABLE USE POLICY

I, the undersigned, do hereby state and affirm:

1. I have read, understand and will comply with the Company’s IT Acceptable Use Policy.

2. I understand that policy does not create a contract of employment and does not limit the Company’s right to
discipline or discharge employees.

Signed
Print Name Dumitrache Vlad
Date 09.08.2021

PLEASE RETURN TO:


Human Resources Administrator
NetCracker Technology Corp.

5
NetCracker Technology Corporation
IT Acceptable Use Policy
January 2021

You might also like