Acceptable Use Policy
|
|
|
- Bernadette Hutchinson
- 10 years ago
- Views:
Transcription
1 Acceptable Use Policy 1. Overview Nicholas Financial Inc. s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Nicholas Financial s established culture of openness, trust and integrity. The Company is committed to protecting employees, partners, customers and the company from illegal or damaging actions by individuals, either knowingly or unknowingly. Internet/Intranet/Extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, WWW browsing, and FTP, are the property of Nicholas Financial. These systems are to be used for business purposes in serving the interests of the company, and of our clients and customers in the course of normal operations. Please review Human Resources policies for further details. Effective security is a team effort involving the participation and support of every Nicholas Financial employee and affiliate who deals with information and/or information systems. It is the responsibility of every computer user to know these guidelines, and to conduct their activities accordingly. 2. Purpose The purpose of this policy is to outline the acceptable use of computer equipment at Nicholas Financial. These rules are in place to protect the employee, our customers and Nicholas Financial. Inappropriate use exposes Nicholas Financial to risks including virus attacks, compromise of network systems and services, and legal issues. 3. Scope This policy applies to the use of information, electronic and computing devices, and network resources to conduct Nicholas Financial business or interact with internal networks and business systems, whether owned or leased by Nicholas Financial, the employee, or a third party. All employees, contractors, consultants, temporary, and other workers at Nicholas Financial and its subsidiaries are responsible for exercising good judgment regarding appropriate use of information, electronic devices, and network resources in accordance with Nicholas Financial policies and standards, and local laws and regulation. Exceptions to this policy are documented in section 5.2 This policy applies to employees, contractors, consultants, temporaries, and other workers at Nicholas Financial. This policy applies to all equipment that is owned or leased by Nicholas Financial. Nic hola sfina nc ia l,inc.2015 AllRig htsre se rve d Pa g e 1
2 4. Policy 4.1 General Use and Ownership Nicholas Financial proprietary information stored on electronic and computing devices whether owned or leased by Nicholas Financial, the employee or a third party, remains the sole property of Nicholas Financial. You must ensure that proprietary information is protected You have a responsibility to promptly report the theft, loss or unauthorized disclosure of Nicholas Financial proprietary information You may access, use or share Nicholas Financial proprietary information only to the extent it is authorized and necessary to fulfill your assigned job duties Employees are responsible for exercising good judgment regarding the reasonableness of personal use. The Company is responsible for creating guidelines concerning personal use of Internet/Intranet/Extranet systems For security and network maintenance purposes, authorized individuals within Nicholas Financial may monitor equipment, systems and network traffic at any time Nicholas Financial reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy. 4.2 Security and Proprietary Information All mobile and computing devices that connect to the internal network must comply with Nicholas Financial s access procedures System level and user level passwords must comply with the company s password policies. Providing access to another individual, either deliberately or through failure to secure its access, is prohibited All computing devices must be secured with a password-protected screensaver with the automatic activation feature set to 15 minutes or less. You must lock the screen or log off when the device is unattended Postings by employees from a Nicholas Financial address to newsgroups are prohibited Employees must use extreme caution when opening attachments received from unknown senders, which may contain malware. Nic hola sfina nc ia l,inc.2015 AllRig htsre se rve d Pa g e 2
3 4.3 Unacceptable Use The following activities are, in general, prohibited. Employees may be exempted from these restrictions during the course of their legitimate job responsibilities (e.g., systems administration staff may have a need to disable the network access of a host if that host is disrupting production services). Under no circumstances is an employee of Nicholas Financial authorized to engage in any activity that is illegal under local, state, federal or international law while utilizing Nicholas Financial-owned resources. The lists below are by no means exhaustive, but attempt to provide a framework for activities which fall into the category of unacceptable use System and Network Activities The following activities are strictly prohibited, with no exceptions: 1. Violations of the rights of any person or company protected by copyright, trade secret, patent or other intellectual property, or similar laws or regulations, including, but not limited to, the installation or distribution of "pirated" or other software products that are not appropriately licensed for use by Nicholas Financial. 2. Unauthorized copying of copyrighted material including, but not limited to, digitization and distribution of photographs from magazines, books or other copyrighted sources, copyrighted music, and the installation of any copyrighted software for which Nicholas Financial or the end user does not have an active license is strictly prohibited. 3. Accessing data, a server or an account for any purpose other than conducting Nicholas Financial business, even if you have authorized access, is prohibited. 4. Exporting software, technical information, encryption software or technology, in violation of international or regional export control laws, is illegal. The appropriate management should be consulted prior to export of any material that is in question. 5. Introduction of malicious programs into the network or server (e.g., viruses, worms, Trojan horses, bombs, etc.). 6. Revealing your account password to others or allowing use of your account by others. This includes family and other household members when work is being done at home. 7. Using a Nicholas Financial computing asset to actively engage in procuring or transmitting material that is in violation of sexual harassment or hostile workplace laws in the user's local jurisdiction. 8. Making fraudulent offers of products, items, or services originating from any Nicholas Financial account. Nic hola sfina nc ia l,inc.2015 AllRig htsre se rve d Pa g e 3
4 9. Making statements about warranty, expressly or implied, unless it is a part of normal job duties. 10. Effecting security breaches or disruptions of network communication. Security breaches include, but are not limited to, accessing data of which the employee is not an intended recipient or logging into a server or account that the employee is not expressly authorized to access, unless these duties are within the scope of regular duties. For purposes of this section, "disruption" includes, but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information for malicious purposes. 11. Port scanning or security scanning is expressly prohibited unless prior notification to Nicholas Financial s IT department is made. 12. Executing any form of network monitoring which will intercept data not intended for the employee's host, unless this activity is a part of the employee's normal job/duty. 13. Circumventing user authentication or security of any host, network or account. 14. Introducing honeypots, honeynets, or similar technology on the Nicholas Financial network. 15. Interfering with or denying service to any user other than the employee's host (for example, denial of service attack). 16. Using any program/script/command, or sending messages of any kind, with the intent to interfere with, or disable, a user's terminal session, via any means, locally or via the Internet/Intranet/Extranet. 17. Providing information about, or lists of, Nicholas Financial employees or customer to parties outside Nicholas Financial and Communication Activities When using company resources to access and use the Internet, users must realize they represent the company. Questions may be addressed to the company s main corporate mailing address or web site. 1. Sending unsolicited messages, including the sending of "junk mail" or other advertising material to individuals who did not specifically request such material ( spam). 2. Any form of harassment via , telephone or paging, whether through language, frequency, or size of messages. 3. Unauthorized use, or forging, of header information. 4. Solicitation of for any other address, other than that of the poster's account, with the intent to harass or to collect replies. Nic hola sfina nc ia l,inc.2015 AllRig htsre se rve d Pa g e 4
5 5. Creating or forwarding "chain letters", "Ponzi" or other "pyramid" schemes of any type. 6. Use of unsolicited originating from within Nicholas Financial's networks of other Internet/Intranet/Extranet service providers on behalf of, or to advertise, any service hosted by Nicholas Financial or connected via Nicholas Financial's network. 7. Posting the same or similar non-business-related messages to large numbers of Usenet newsgroups (newsgroup spam) Blogging and Social Media 1. Blogging by employees, whether using Nicholas Financial s property and systems or personal computer systems, is also subject to the terms and restrictions set forth in this Policy. Use of Nicholas Financial s systems to engage in blogging is prohibited. 2. Nicholas Financial s Confidential Information policy also applies to all social media. As such, Employees are prohibited from revealing any of Nicholas Financial s confidential or proprietary information, trade secrets or any other material covered by Nicholas Financial s Confidential Information policy when engaged in blogging or social media posting of any sort. 3. Employees shall not engage in any social media posting or blogging that may harm or tarnish the image, reputation and/or goodwill of Nicholas Financial and/or any of its employees. Employees are also prohibited from making any discriminatory, disparaging, defamatory or harassing comments when using social media or otherwise engaging in any conduct prohibited by Nicholas Financial s Non-Discrimination and Anti-Harassment policy. 4. Employees may also not attribute personal statements, opinions or beliefs to Nicholas Financial when engaged in social media posting or blogging. If an employee is expressing his or her beliefs and/or opinions in social media posts or blogs, the employee may not, expressly or implicitly, represent themselves as an employee or representative of Nicholas Financial. Employees assume any and all risk associated with social media posting or blogging. 5. Apart from following all laws pertaining to the handling and disclosure of copyrighted or export controlled materials, Nicholas Financial s trademarks, logos and any other Nicholas Financial intellectual property may also not be used in connection with any social media or blogging activity Nic hola sfina nc ia l,inc.2015 AllRig htsre se rve d Pa g e 5
6 5. Policy Compliance 5.1 Compliance Measurement The Company team will verify compliance to this policy through various methods, including but not limited to, business tool reports, internal and external audits, and feedback to the policy owner. 5.2 Exceptions Any exception to the policy must be approved by the company s management in advance. 5.3 Non-Compliance An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. 6. Related Standards, Policies and Processes Nicholas Financial Policy Data Protection Standard Social Media Policy Minimum Access Policy Password Policy I understand and agree to terms and stipulations set forth in this Acceptable Use Policy statement. Employee Printed Name Employee Signature Date PLEASE RETURN THIS FORM TO THE HUMAN RESOURCES DEPARTMENT. IT WILL BE PLACED IN YOUR PERSONNEL FILE. Nic hola sfina nc ia l,inc.2015 AllRig htsre se rve d Pa g e 6
7 7. Revision History Date of Change Responsible Summary of Change Nic hola sfina nc ia l,inc.2015 AllRig htsre se rve d Pa g e 7
Acceptable Use Policy
1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established culture of openness,
Acceptable Use Policy
Acceptable Use Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
REGION 19 HEAD START. Acceptable Use Policy
REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions
How To Use A College Computer System Safely
1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.
ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure
ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure MANUAL: Hospital Wide SECTION: Information Technology SUBJECT: Acceptable Use of Information Systems Policy IMPLEMENTATION: 01/2011 CONCURRENCE:
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical
AASTMT Acceptable Use Policy
AASTMT Acceptable Use Policy Classification Information Security Version 1.0 Status Not Active Prepared Department Computer Networks and Data Center Approved Authority AASTMT Presidency Release Date 19/4/2015
Insert GNIS Logo Here. Acceptable Use Policy & Guidelines Information Technology Policies & Procedures. Guangzhou Nanhu International School
Insert GNIS Logo Here Acceptable Use Policy & Guidelines Information Technology Policies & Procedures Guangzhou Nanhu International School May, 2013 Table of Contents 1 Overview...1 2 Purpose...1 3 Scope...1
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing
Terms in this document are defined in the SOA policy ISP-002 Information Security Glossary.
Effective: 8/13/2010 Last Review: 11/1/2010 Next Review: Quarterly Version: 1.1 Approved by: CIO Pages 5 Distribution: SOA 1. Purpose To outline acceptable use and clarify the protection of State of Alaska
13. Acceptable Use Policy
To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information
Odessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator
POLICIES AND PROCEDURES NEW JERSEY EARLY INTERVENTION SYSTEM No: NJEIS-17 Subject: Computers & Electronic Records Effective Date: May 1, 2011 Responsible Party: Part C Coordinator I. Purpose To protect
INFORMATION SYSTEM GENERAL USAGE POLICY
PURPOSE The Information System General Usage Policy ("Policy") establishes appropriate uses of Devon s Information Systems. Devon provides secure Information Systems in accordance with the Information
Student Network Acceptable Use Policy Lone Jack C-6 School District
Student Network Acceptable Use Policy The, hereinafter known as LJC6, provides students and staff with a service called the Network. The Network is a computer service, which includes, but is not limited
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy
Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
Acceptable Use and Publishing Policy
1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
Information Technology Policies and Procedures. Wakulla County School District. March 2014
Information Technology Policies and Procedures Wakulla County School District March 2014 Table of contents TABLE OF CONTENTS... 1 1.0 OVERVIEW... 2 2.0 PURPOSE... 2 3.0 SCOPE... 2 4.0 ACCEPTABLE USE POLICY...
Century Commons' Internet Use
Century Commons' Internet Use Please Note: Even though you are unable to access the Internet, the sites below are always available. Open up Internet Explorer and type any of these in your address bar to
GOSFIELD NORTH COMMUNICATIONS CO-OPERATIVE LIMITED ( GOSFIELD ) ACCEPTABLE USE POLICY
GOSFIELD NORTH COMMUNICATIONS CO-OPERATIVE LIMITED ( GOSFIELD ) ACCEPTABLE USE POLICY 1. Introduction This acceptable use policy ("Policy") sets out the principles, terms and conditions that govern the
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
Acceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy
LCUSD Personnel Use of Technology Regulations (AR 4163.4) Updated 08/21/08 p. 1 of 5 La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology
FKCC AUP/LOCAL AUTHORITY
FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
Acceptable Use Policy
Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive
Commonwealth Office of Technology
Commonwealth Office of Technology ENTERPRISE POLICY Policy Number: CIO-060 Effective Date: 05/15/96 Revision Date: 03/19/08 Policy Statement: The purpose of this enterprise policy is to define and outline
Acceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
Jefferson County School District Information Technology Policies and Procedures
Jefferson County School District Information Technology Policies and Procedures 575 S. Water Street Monticello, FL 32344 (850) 342-0100 www.jeffersonschooldistrict.org June 2014 Table of Contents 1.0 Overview...
Acceptable Use Policy. This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name.
This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name. This Acceptable Use Policy forms part of the Registry Policies that apply to and
Acceptable Use Policy
Acceptable Use Policy Acceptable Use Policy (AUP) ionfish Group, LLC s network and services have been designed to serve its clients, partners, and employees (each individually a User ), and to enhance
CT Communications Internet Handbook
CT Communications Internet Handbook CT Communications Network Acceptable Use Policy Introduction: Protection of our Customers and our resources, the ability to provide quality service to our Customers,
Web Server & Systems Usage Policy. The WGG Associates Limited Usage Policy has been developed with the following objectives:
Web Server & Systems Usage Policy The WGG Associates Limited Usage Policy has been developed with the following objectives: Ensure security, reliability and privacy of WGG Associates Limited' systems and
TRIPLE PLAY SERVICES ACCEPTABLE USE POLICY
TRIPLE PLAY SERVICES ACCEPTABLE USE POLICY 1. INTRODUCTION 2. GENERAL 3. USENET POSTINGS 4. ACCOUNT AND NETWORK SECURITY 5. ELECTRONIC MAIL 6. PROTECTION OF NETWORK PERFORMANCE 7 PERSONAL HOME PAGES 8.
Acceptable Use Policy
Introduction This Acceptable Use Policy (AUP) sets forth the terms and conditions for the use by a Registrant of any domain name registered in the top-level domain (TLD). This Acceptable Use Policy (AUP)
Virgin Media Business Acceptable Use Policy (Internet)
Virgin Media Business Acceptable Use Policy (Internet) 1 Introduction 1.1 This Acceptable Use Policy ( AUP ) specifies actions prohibited by Virgin Media Business to users of the Internet Services (in
DUVAL COUNTY PUBLIC SCHOOLS (DCPS) INFORMATION SECURITY PROGRAM SUBJECT: ACCEPTABLE USE POLICY (AUP) POLICY NUMBER: 8.71
ACCEPTABLE USE POLICY (AUP) POLICY NUMBER: 8.71 PURPOSE/SCOPE: This establishes the School Board Policy for Acceptable Use of Information Resources and applies to all users of DCPS information resources.
STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES
STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES Star has adopted this Acceptable Use Policy ( AUP ) to outline the acceptable use of Star s Broadband Internet
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
How To Get Rid Of Highwinds.Com (For Free)
HIGHWINDS NETWORK GROUP, INC. ACCEPTABLE USE POLICY 1. Terms of Use. a. In General. All Highwinds customers are responsible for reviewing and complying with this Acceptable Use Policy (the Policy ). Highwinds
STVPS.net end user agreement
STVPS.net end user agreement Think Huge Limited T/A STVPS.net Introduction Updated: January 19 th 2014 Your use of all Think Huge Limited services is governed by this Terms of Service (the "Terms of Service").
LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY
LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY 1. Introduction LETABA WIRELESS INTERNET CC is committed to complying with legislation and ensuring that all its customers have the ability to use its
HTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications
Page 1 of 5 HTC Communications ACCEPTABLE USE POLICY FOR HIGH SPEED INTERNET SERVICE This Acceptable Use Policy ( AUP ) governs high speed Internet service provided to you by HTC Communications (together
How To Protect Ais From Harm
AIS Acceptable Use and Information Security Procedures Administrative Information Services a unit of Information Technology Services May 2015 Mark Zimmerman AIS Information Security Officer The Pennsylvania
Acceptable Use Policy - NBN Services
OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 [email protected] www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:
MNI Networks Limited Acceptable Use Policy
This Acceptable Use Policy ("AUP") sets out the actions prohibited to users of the MNINET Network ( MNINET ). Users are defined as anyone who uses or accesses the.ms domain registry, who has responsibility
Cablelynx Acceptable Use Policy
Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
maintain and enforce on its user clients an acceptable use policy similar in scope and intent to this Acceptable Use Policy.
CTC Acceptable Use Policy Consolidated Telephone Company doing business as Consolidated Telecommunications Company (CTC) has adopted this Acceptable Use Policy to encourage the use of its network and services
ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX )
ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX ) 1. ACCEPTANCE OF TERMS THROUGH USE This website (the Site ) provides you (the Customer
State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.
Subject: Authoritative Policy: Procedure Number: Distribution: Purpose: Acceptable Use of Information Technology (former Ad Guide 1460.00) Standard Number 1340.00 Information Technology Information Security
INTERNET ACCEPTABLE USE POLICY
INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods
STOWE COMMUNICATIONS ACCEPTABLE USE POLICY FOR BUSINESS SERVICES HIGH SPEED INTERNET
STOWE COMMUNICATIONS ACCEPTABLE USE POLICY FOR BUSINESS SERVICES HIGH SPEED INTERNET Contents 1. Prohibited Uses and Activities 2. Customer Conduct and Features of the Service 3. Network Management and
Dedicated Server Service Agreement
Dedicated Server Service Agreement By hosting with DeVore Technologies Inc. you are agreeing with the terms of these agreements. These agreements are subject to change at any point in time without notification
PINELAND TELEPHONE COOPERATIVE DSL SERVICE AGREEMENT
PINELAND TELEPHONE COOPERATIVE DSL SERVICE AGREEMENT Check Plan: Residential Business Installation Cost $45.00 $62.00 Check Plan: 256 Down/128 Up $24.95 $44.95 Monthly 1.544 Down/256 Up $39.95 $49.95 Monthly
(For purposes of this Agreement, "You", " users", and "account holders" are used interchangeably, and where applicable).
Key 2 Communications Inc. Acceptable Use Policy Please read carefully before accessing and/or using the Key 2 Communications Inc. Web site and/or before opening an account with Key 2 Communications Inc..
PLEASE READ THIS AGREEMENT CAREFULLY, AS IT CONTAINS IMPORTANT INFORMATION REGARDING YOUR LEGAL RIGHTS AND REMEDIES.
Brightcore Consulting Moodle Hosting Service Agreement Last Revised: September 30, 2013 PLEASE READ THIS AGREEMENT CAREFULLY, AS IT CONTAINS IMPORTANT INFORMATION REGARDING YOUR LEGAL RIGHTS AND REMEDIES.
Forrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY
Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY CONTENTS I. Introduction II. Violation of this Acceptable Use Policy III. Prohibited Uses and Activities IV. Customer
ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy
ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy
