General Use and Ownership: Cellphones
General Use and Ownership: Cellphones
General Use and Ownership: Cellphones
Use of Equipment
All CyberFog property including desks, storage areas, work areas, lockers,
file cabinets, computer systems, office telephones, cellphones, modems,
copy/xerox machines, duplicating machines, servers and rack servers, special
machines and vehicles must be used properly and maintained in good
working order. Employees who lose, steal, or misuse company property may be
personally liable for replacing or repairing the item.
CyberFog reserves the right, at all times and without further notice, to inspect
and search all CyberFog property for the purpose of determining whether this
1
policy or any other policy of CyberFog has been violated, or when an inspection
and investigation is necessary for purposes of promoting safety in the
workplace or compliance with state and federal laws. These inspections may be
conducted during or outside of business hours and in the presence or absence
of the affected employee.
To protect CyberFog legitimate business interests, CyberFog reserves the right
to question and inspect or search any employee or other individual entering or
leaving company premises, with or without notice. The inspection or search
may include any packages or items that the individual may be carrying,
including briefcases, handbags, knapsacks, shopping bags, et cetera. The
individual may be requested to display the contents of any packages and/or
turn out his or her pockets, et cetera, in the presence of a representative of
the CyberFog, typically a management employee of the same gender. ???
Whether information is entered or sent during or outside of working time,
employees have no right of privacy as to any information or file maintained in
or on Company property or transmitted or stored through Company computer
systems, voice mail, e-mail or other technical resources. If, during the course
of your employment, you perform or transmit work on Company computer
systems or other technical resources, your work may be subject to the
investigation, search and review of others in accordance with this policy. In
addition, any electronically stored communications that you either send to or
receive from others may be retrieved and reviewed when doing so serves the
legitimate business interests and obligations of the Company.
Employees should use the computer systems only for business purposes. Using
e-mail or the Internet for personal, non-business, purposes is prohibited during
working time.
Unacceptable Use of the Internet
In addition to the requirements stated above, use of the Internet must not
disrupt the operation of the CyberFog network or the networks of other users,
and must not interfere with the productivity of any employee. Copyrighted
materials belonging to entities other than CyberFog may not be transmitted by
employees on the Internet. One copy of copyrighted material may be
downloaded for an employees personal use in research if pre-approved by the
employees manager. Employees are not permitted to copy, transfer, rename,
add or delete information or programs belonging to other users unless given
express permission to do so by the owner of such information or programs.
Employees should be aware that harassment of any kind is prohibited. No
2
Unacceptable Use
The following activities are prohibited. Employees may be exempted from
these restrictions during the course of their legitimate job responsibilities (e.g.,
systems administration staff may have a need to disable the network access of
3
When using company resources to access and use the Internet, users must
realize they represent the CyberFog company. Whenever employees state an
affiliation to the company, they must also clearly indicate that "the opinions
expressed are my own and not necessarily those of the company". Questions
may be addressed to the IT Department
1. Sending unsolicited email messages, including the sending of "junk mail" or
other advertising material to individuals who did not specifically request such
material (email spam).
2. Any form of harassment via email, telephone or paging, whether through
language, frequency, or size of messages.
3. Unauthorized or fake use of email header information.
4. Solicitation of email for any other email address, other than that of the
poster's account, with the intent to harass or to collect replies.
5. Creating or forwarding "chain letters" or other "pyramid" schemes of any
type.
6. Use of unsolicited email originating from within CyberFog networks of other
Internet/Intranet/Extranet service providers on behalf of, or to advertise, any
service hosted by CyberFog or connected via CyberFog network.
7. Posting the same or similar non-business-related messages to large
numbers of Usenet newsgroups (newsgroup spam).
3. Employees shall not engage in any blogging that may harm or tarnish the
image, reputation and/or goodwill of CyberFog and/or any of its employees.
Employees are also prohibited from making any discriminatory, disparaging,
defamatory or harassing comments when blogging or otherwise engaging in
any conduct prohibited by CyberFogs Non-Discrimination and Anti-Harassment
policy.
4. Employees may also not attribute personal statements, opinions or beliefs to
CyberFog when engaged in blogging. If an employee is expressing his or her
beliefs and/or opinions in blogs, the employee may not, expressly or implicitly,
represent themselves as an employee or representative of CyberFog.
Employees assume any and all risk associated with blogging.
5. Apart from following all laws pertaining to the handling and disclosure of
copyrighted or export controlled materials, CyberFogs trademarks, logos and
any other CyberFog branding and intellectual property may also will be used
only in connection with CyberFog business activity and interests.
Policy Compliance
1. Compliance Measurement
The Infosec team will verify compliance to this policy through various methods,
including but not limited to, business tool reports, internal and external audits,
and feedback to the policy owner.
2. Exceptions
Any exception to the policy must be approved by the management team,
infosec team / HR team in advance.
3. Non-Compliance
An employee found to have violated this policy may be subject to disciplinary
action, up to and including termination of employment.