Minuteman International Inc. (Minuteman, PowerBoss, Multi-Clean) Internet Access / Policy (Effective May 01,2012) 1.

Similar documents
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

Internet Acceptable Use Policy

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students

COMPUTER, INTERNET, & USE POLICY

Acceptable Use of Information Technology

City of Venice Information Technology Usage Policy

DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

Board Adopted Policy

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS

Administrative Procedure 3720 Computer and Network Use

EMPLOYEE COMPUTER USE POLICY

Hyde School Student Computer Systems Acceptable Use Policy

Bates Technical College. Information Technology Acceptable Use Policy

New Mexico Highlands University (NMHU) Information Technology Services (ITS) Information Technology Resources Policy: Internet, Intranet, ,

R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS

LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN

MEDWAY PUBLIC SCHOOLS Medway, MA. Acceptable Use Policy for School Network, Internet, and Equipment Grades 7-12

Human Resources Policy and Procedure Manual

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

Westmoreland Intermediate Unit Internet Acceptable Use Policy

FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND USAGE POLICY

3. Electronic Mail ( )

1. Computer and Technology Use, Cell Phones Information Technology Policy

USE OF INFORMATION TECHNOLOGY FACILITIES

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

ACCEPTABLE USE POLICY

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY

LINCOLN COLLEGE INTERNET, , AND COMPUTER ACCEPTABLE USE POLICY

Internet usage Policy

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

COMPUTER NETWORK AGREEMENT FORM

Westwood Baptist Church Computer use Policy

Internet and Computers. Acceptable Use and Internet Safety

COMPUTER TECHNOLOGY ACCEPTABLE USE & INTERNET SAFETY

Business Conduct, Compliance and Ethics Program. important

North Clackamas School District 12

Acceptable Use Policy

Riverside Community College District Policy No General Institution

School Web Design Ltd Acceptable Use Policy. 1. Definitions. 2. Resource Usage. 3. Prohibited Uses

CORPORATE. Tab Authority Subject Related Policies POLICY STATEMENT PURPOSE

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures

region16.net Acceptable Use Policy ( AUP )

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

COLLINS CONSULTING, Inc.

Rocklin Unified School District Employee Authorized Network, Internet Usage, and Privacy Agreement

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5

Dauphin County Technical School

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No

Policy for the Acceptable Use of Information Technology Resources

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

Hope In-Home Care CODE OF CONDUCT AND ETHICS

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

ELECTRONIC COMMUNICATIONS: / INTERNET POLICY

Revelstoke Board of Education Policy Manual

Descriptor Code: EFE-P

City of Cleveland Social Media Policy

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Online Communication Services - TAFE NSW Code of Expected User Behaviour

COMPUTER /ONLINE SERVICES (Acceptable Use and Internet Safety)

Code of Business Conduct and Ethics. Strike Energy Limited ACN

Acceptable Use Policy

COMPUTER USE POLICY. 1.0 Purpose and Summary

Policy No: 2-B8. Originally Released: Date for Review: 2016

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES

System Access, Acceptable Use And Internet Safety Policy Adopted: November 2005 Revised: April 2009, April 2011, February Purpose.

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

U.S. Chemical Safety and Hazard Investigation Board

RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET

HTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications

Internet, Social Networking and Telephone Policy

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY

13. Acceptable Use Policy

INTERNET AND POLICY

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE

Elite Estate Agents general terms and conditions

The office responsible for technology use compliance for the Sonoma County Junior College District is the Information Technology Department.

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy

Instruction. Neoga Community Unit School District #3 Page 1 of 5

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

13.19 ETHICS REPORTING POLICY AND PROCEDURE

Forrestville Valley School District #221

f. Engaged in for any purpose that is illegal or contrary to Gateway Preparatory Academy policy or business interests.

SPRINGFIELD PUBLIC SCHOOLS Springfield, New Jersey 07081

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

Electronic Communications System

INTERNET, AND PHONE SYSTEMS

Information Technology Acceptable Use Policy

Transforming business through technology. Acceptable Use Policy & Data Centre Policies

POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6

POLICIES AND REGULATIONS Policy #78

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

Tele-Media Cable Internet Acceptable Use Policy

Transcription:

Minuteman International Inc. (Minuteman, PowerBoss, Multi-Clean) Internet Access / E-mail Policy (Effective May 01,2012) 1.0 Purpose The Internet is a powerful information tool that provides access to an impressive variety of resources. Minuteman International, Inc. (MINUTEMAN) provides access to the Internet for the sole purpose of facilitating business activities. Use of the MINUTEMAN Internet connection is encouraged to improve the quality of your work. Use of the Internet for nonbusiness purposes is not permitted and is considered a misuse of company assets. This policy establishes employee responsibilities regarding but not limited to E-Mail, World- Wide-Web access transfer of files and information retrieval via the Internet when using equipment, software or networks owned by MINUTEMAN. 2.0 Objectives Identify proper use of the Internet. Ensure employees are aware of proper conduct on the Internet. 3.0 Policy Like other company supplied tools, the Internet and email is to be used for business purposes only. The use of Internet is a privilege, not a right. Inappropriate use, including any violation of this policy may result in the cancellation of this privilege or other disciplinary action, including but not limited to the termination of your employment or even criminal prosecution, as MINUTEMAN, in its sole discretion deems appropriate. Additionally the use of the company printers to print nonbusiness information from the internet is also prohibited. No employee should have any expectation of privacy as to his or her internet usage. Transmission of material in violation of any country, state or local regulation is prohibited. This includes, but is not limited to, copyrighted, threatening or obscene material. Information obtained via the Internet may not be accurate, and the user must check the accuracy, adequacy, or completeness of any such information. Furthermore, it is the user s responsibility, concerning information obtained from the Internet, to be aware of copyright limitation and to use such material in accordance with the permissions granted by the publisher. MINUTEMAN reserves the right, in its sole discretion, to restrict access to materials on the Internet where deemed appropriate. Page 1 of 6

MINUTEMAN reserves the right, consistent with Federal and State laws and regulations, to monitor all Internet access, including but not limited to E-mail and World-Wide-Web (www). Due to the non-secure nature of Internet mail, users must consider Internet Email to be public information. No trade secret or confidential information of any type should be transmitted over the Internet. No government-classified information of any type should be transmitted over the Internet. MINUTEMAN and its employees are responsible for the full compliance with U.S. export control regulations. Use of the Internet does not eliminate the need for compliance with these regulations The most serious threat posed by the use of the Internet is from viruses, security breaches or other forms of reckless mischief. Users of the Internet must be aware that information and programs downloaded from the Internet may contain hidden code, capable of making the entire network unusable or destroying data. It is the user s responsibility to help secure the network from such attacks. As such, any data or programs acquired from the Internet may only be downloaded with written authorization from a Company Officer. INTRODUCTION The Minuteman corporate online systems, including Internet access, are powerful information acquisition and dissemination tools that provide access to an impressive variety of resources. MINUTEMAN provides access to these systems for the sole purpose of facilitating business activities. Use of the network, online systems and Internet connection is encouraged to improve the quality of your work. Use of these systems for non-business purposes is not permitted and is considered a misuse of company assets. This policy establishes employee responsibilities regarding but not limited to E-Mail, World- Wide-Web access, transfer of files, and information retrieval via Corporate online systems or the Internet, when using equipment, software or networks owned by MINUTEMAN. CORPORATE ONLINE SYSTEMS USER AGREEMENT PLEASE READ THIS AGREEMENT CAREFULLY, THIS AGREEMENT DESCRIBES THE BASIC RESPONSIBILITIES THAT YOU ARE REQUIRED TO OBSERVE AS AN EMPLOYEE IN USING CORPORATE ONLINE SYSTEMS. MINUTEMAN BELIEVES THAT THIS AGREEMENT STRIKES A FAIR BALANCE BETWEEN ITS INTERESTS AND YOUR NEEDS AND EXPECTATIONS. THIS AGREEMENT HAS BEEN MADE TO PROTECT BOTH YOU AND EMPLOYER BY BEING AS CLEAR AND PRECISE AS POSSIBLE. THIS AGREEMENT SPECIFICALLY REQUIRES THAT THE EMPLOYEE AUTHORIZE MINUTEMAN TO RECORD AND STORE FOR MANAGEMENT USE, OF ANY KIND THE ELECTRONIC MESSAGES SENT AND RECEIVED, THE INTERNET ADDRESS OF ANY SITE VISITED AND ANY NETWORK ACTIVITY IN WHICH THE EMPLOYEE TRANSMITS OR RECEIVES ANY KIND OF FILE. Page 2 of 6

Section 1 USE OF CORPORATE ONLINE SYSTEMS Corporate online systems (including but not limited to online services, e-mail and Internet access) increase company production and employee effectiveness. MINUTEMAN has total discretion over employee s access privileges and the nature of public discussions on the online system. Corporation online systems are company property that is provided to be used for general business purposes to increase production and employee effectiveness only. To ensure the use of company online systems in a productive manner, a list of guidelines has been incorporated. All employees are required to abide by the guidelines: any improper use of corporate online systems is not acceptable and will not be permitted. Section 2 ONLINE SYSTEMS POLICES 2.1 Monitoring Tools. Employer routinely monitors usage patterns for its online communicators. The reasons for monitoring are to leverage online productivity as well as for better planning and management of network resources and to protect trade secrets and confidential information from improper disclosure. 2.2 Blocking of Internet Access. Different access and service levels for different types of personnel may be given to employees depending on the nature of the work. MINUTEMAN reserves the absolute right to block access to certain Internet sites if it becomes necessary. MINUTEMAN blocking of certain Internet sites does not mean MINUTEMAN permits or condones accessing all other sites. Like other company supplied tools the Internet is to be used for business purposes only. The use of Internet is a privilege, not a right. Inappropriate use, including any violation of this policy may result in the cancellation of this privilege or other disciplinary action, including but not limited to the termination of your employment or even criminal prosecution, as MINUTEMAN, in its sole discretion deems appropriate. Additionally the use of the company printers to print non-business information from the internet is also prohibited. No employee should have any expectation of privacy as to his or her internet usage. 2.3 Reasons for Policies. a. To reduce company liability b. To track and control the flow of traffic c. To improve capacity planning d. To decrease network slowdown and keep productivity up e. To maintain good availability of network bandwidth f. To reduce costs g. To protect trade secrets and all confidential information from improper disclosure Page 3 of 6

Section 3 OWNERSHIP OF ELECTRONIC COMMUNICATIONS 3.1 All Communications Over Corporate Online Systems Are Property of MINUTEMAN. All messages created, sent or retrieved over the corporate online systems are the property of MINUTEMAN and employees should not assume electronic communications are totally private. The employer reserves the absolute right to access and monitor all messages and files on the corporate online systems. Information obtained via the Internet may not be accurate and the employees must check the accuracy, adequacy, or completeness of any such information. 3.2 Government Export Regulations. MINUTEMAN and its employees are responsible for the full compliance with any government export control regulations. Use of the Internet does not eliminate the need for compliance with these regulations. Section 4 MAINTAINING A HOSPITABLE ENVIRONMENT 4.1 Maintaining a Hospitable Environment. To ensure corporate online systems are a productive and stable environment the transmittal, retrieval or storage of information that is discriminatory or harassing, obscene, pornographic or X-rated is not permitted. Further, the use of corporate online systems for personal gain or any other purpose, which is illegal, or against company policy or contrary to the company s best interest is not permitted. Section 5 NON-DISCRIMINATION 5.1 Non-Discrimination. The transmittal of messages with derogatory or inflammatory remarks about a person s race, creed, color, national origin, sex, age, disability, marital status, sexual orientation or citizenship status is not permitted. Section 6 DISCLOSURE CONFIDENTIAL INFORMATION 6.1 Communication of Messages Disclosing Trade Secrets is Prohibited. You should recognize that your position with MINUTEMAN requires considerable responsibilities and trust. MINUTEMAN expects to entrust you with highly sensitive, confidential, restricted, and proprietary information involving Proprietary Information and Trade Secrets (as defined in Section 6.2) You are legally and ethically responsible for protecting and preserving employer s proprietary rights. No messages disclosing sensitive, confidential, restricted, non-public or proprietary information involving trade secrets can be transmitted over the corporate online systems. Discussions of any Internal Company affairs on any online system other than the in-house systems are prohibited without prior written approval from a company officer. Page 4 of 6

6.2 Trade Secrets Defined. For purposes of this Agreement, Confidential and/or Proprietary Information and Trade Secrets is any information, including, but not limited to: (1) The operation of Employer s business, consisting, for example, and not intending to be inclusive, of its lists or other identifications of clients or prospective clients of Employer (and key individuals employed or engaged by such clients or prospective clients), the nature and type of services rendered to such clients (or proposed to be rendered to prospective clients), fee charges or to be charged proposals, inventions, methodologies, algorithms, formulae, processes, compilations of information, form and content of databases, designs, drawings, models, equipment results of research proposals, technical or nontechnical data, patterns, programs, devices, techniques, product plans, job notes, reports, records, specifications, software, firmware and procedures used in, or related to, Employer s products or any other documents or notice deemed confidential or proprietary by MINUTEMAN: (2) Employer s relations with its employees including without limitation, salaries, job classifications and skill levels: (3) Financial, sales and marketing data compiled by Employer as well as Employer s financial, sales and marketing plans and strategies, lists of actual or potential customers or suppliers and non-public pricing that derive economic value, actual or potential from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from their disclosure or use: (4) All ideas, concepts, information and written material about a client disclosed to EMPLOYEE by Employer, or acquired from a client of Employer and all financial, accounting statistical, personnel and business data and plans of clients, are and shall remain the sole and exclusive property and proprietary information of the Employer, or said client; (5) Any subjects of efforts that are reasonable under the circumstances to maintain their confidentiality secrecy and/or proprietary. (6) Any and all other items as included in the MINUTEMAN Non-Compete/Confidentiality Agreement you previously signed. Section 7 MAINTAINING SYSTEM SECURITY 7.1 Keeping the Online System Secure From Computer Viruses. No unauthorized downloading/uploading of software or files is allowed in order to prevent viruses from entering the corporate online systems. All software downloaded must be authorized by and registered to the company. Any employee who attempts to disable, defeat or circumvent any company security facility will be subject to immediate dismissal. Page 5 of 6

7.2 Infringement Risk. Employee stocking of unauthorized software is illegal and therefore is strictly prohibited. Section 8 CORPORATE PUBLIC IMAGE 8.1 Employee s Conduct in Public. Corporate online systems are a public place for business communications and all communications over corporate online systems reflect corporate image. All employees are, therefore, responsible to maintain and enhance the corporation s public image and no abusive, discriminatory, defamatory, harassing, inflammatory, profane, pornographic or offensive language or other materials are to be transmitted through the corporate online systems. 8.2 Employees Identity. No message can be transmitted without the employee s identity. Transmittal of messages with an anonymous or fictitious name is prohibited. Section 9 COPYRIGHT 9.1 Copyright Infringement. No copying, downloading, or distributing of any of the copyrighted materials including but not limited to messages, e-mail, text files, program files, image files, database files, sound files and music files through the corporate online systems is allowed. Section 10 VIOLATIONS 10.1 Failure to Comply. Failure to comply with this policy may result in the cancellation of this privilege or other disciplinary action, including but not limited to the termination of your employment or even criminal prosecution, as Minuteman, in its sole discretion deems appropriate. Page 6 of 6

Minuteman International Inc. (Minuteman, PowerBoss, Multi-Clean) Internet Access / E-mail Policy AUTHORIZATION AND ACKNOWLEDGEMENT: As an employee of Minuteman International Inc., I acknowledge that I have received a written copy of the Internet Usage Policy for Minuteman International Inc. [Minuteman, PowerBoss, Multi-Clean] (MINUTEMAN). I understand the terms of this policy and agree to abide by them. I realize and specifically authorize the Company to record and store for management use, any kind of electronic e-mail messages I send and receive, the Internet address of any site that I visit, and any network activity in which I transmit or receive any kind of file. I understand that any violation of this policy may result in the cancellation of this privilege or other disciplinary action, including but not limited to the termination of my employment or even criminal prosecution, as MINUTEMAN, in its sole discretion deems appropriate. Employee Signature Date Employee Print Name Minuteman International Inc.