Internet Usage Policy
Internet Usage Policy
1. Overview
Internet connectivity presents the company with new risks that must be addressed to safeguard
the facility’s vital information assets. These risks include:
Access to the Internet by personnel that is inconsistent with business needs results in the misuse
of resources. These activities may adversely affect productivity due to time spent using or
"surfing" the Internet. Additionally, the company may face loss of reputation and possible legal
action through other types of misuse.
All information found on the Internet should be considered suspect until confirmed by another
reliable source. There is no quality control process on the Internet, and a considerable amount of
its information is outdated or inaccurate.
Access to the Internet will be provided to users to support business activities and only on an as-
needed basis to perform their jobs and professional roles.
2. Purpose
The purpose of this policy is to define the appropriate uses of the Internet by <Company Name>.
employees and affiliates.
3. Scope
The Internet usage Policy applies to all Internet users (individuals working for the company,
including permanent full-time and part-time employees, contract workers, temporary agency
workers, business partners, and vendors) who access the Internet through the computing or
networking resources. The company's Internet users are expected to be familiar with and to
comply with this policy, and are also required to use their common sense and exercise their good
judgment while using Internet services.
E-mail -- Send/receive E-mail messages to/from the Internet (with or without document
attachments).
Navigation -- WWW services as necessary for business purposes, using a hypertext
transfer protocol (HTTP) browser tool. Full access to the Internet; limited access from the
Internet to dedicated company public web servers only.
File Transfer Protocol (FTP) -- Send data/files and receive in-bound data/files, as
necessary for business purposes.
Management reserves the right to add or delete services as business needs change or conditions
warrant.
All other services will be considered unauthorized access to/from the Internet and will not be
allowed.
Policy awareness and acknowledgment, by signing the acknowledgment form, is required before
access will be granted.
3.2.2 Approval
Internet access is requested by the user or user’s manager submitting an IT Service Request User
Access form to the IT department along with an attached copy of a signed Internet usage
Coverage Acknowledgment Form.
All user IDs that have been inactive for sixty (60) days will be revoked. The privileges granted to
users must be reevaluated by management annually. In response to feedback from management,
systems administrators must promptly revoke all privileges no longer needed by users.
4. Policy
4.1 Resource Usage
Access to the Internet will be approved and provided only if reasonable business needs are
identified. Internet services will be granted based on an employee’s current job responsibilities.
Acceptable use of the Internet for performing job functions might include:
All users of the Internet should be aware that the company network creates an audit log reflecting
request for service, both in-bound and out-bound addresses, and is periodically reviewed.
Users who choose to store or transmit personal information such as private keys, credit card
numbers or certificates or make use of Internet "wallets" do so at their own risk. The company is
not responsible for any loss of information, such as information stored in the wallet, or any
consequential loss of personal property
The company also prohibits the conduct of a business enterprise, political activity, engaging in
any form of intelligence collection from our facilities, engaging in fraudulent activities, or
knowingly disseminating false or otherwise libelous materials.
Unless specifically authorized under the provisions of section 4.3, the following activities
are also strictly prohibited:
Unauthorized downloading of any shareware programs or files for use without
authorization in advance from the IT Department and the user’s manager.
Any ordering (shopping) of items or services on the Internet.
Playing of any games.
Forwarding of chain letters.
Participation in any on-line contest or promotion.
Acceptance of promotional gifts.
Use of Social media sites and Youtube videos
Bandwidth both within the company and in connecting to the Internet is a shared, finite resource.
Users must make reasonable efforts to use this resource in ways that do not negatively affect
other employees. Specific departments may set guidelines on bandwidth use and resource
allocation, and may ban the downloading of particular file types.
Similarly, reproduction of materials available over the Internet must be done only with the
written permission of the author or owner of the document. Unless permission from the
copyright owner(s) is first obtained, making copies of material from magazines, journals,
newsletters, other publications and online documents is forbidden unless this is both reasonable
and customary. This notion of "fair use" is in keeping with international copyright laws.
Using company computer resources to access the Internet for personal purposes, without
approval from the user’s manager and the IT department, may be considered cause for
disciplinary action up to and including termination.
All users of the Internet should be aware that the company network creates an audit log reflecting
request for service, both in-bound and out-bound addresses, and is periodically reviewed.
Users who choose to store or transmit personal information such as private keys, credit card
numbers or certificates or make use of Internet "wallets" do so at their own risk.
Management reserves the right to examine E-mail, personal file directories, web access, and
other information stored on company computers, at any time and without notice. This
examination ensures compliance with internal policies and assists with the management of
company information systems.
In addition, contents of the material made available to the public through the Internet must be
formally reviewed and approved before being published. All material should be submitted to the
Marketing Department for initial approval to continue. All company pages are owned by, and are
the ultimate responsibility of, the Marketing Department.
All company web sites must be protected from unwanted intrusion through formal security
measures which can be obtained from the IT department.
5.2 Exceptions
Any exception to the policy must be approved by the Compliance Team in advance.
5.3 Non-Compliance
An employee found to have violated this policy may be subject to disciplinary action, up to and
including termination of employment.
Additionally, the company may at its discretion seek legal remedies for damages incurred as a
result of any violation. The company may also be required by law to report certain illegal
activities to the proper enforcement agencies.
Before access to the Internet via company network is approved, the potential Internet user is
required to read this Internet usage Policy and sign an acknowledgment form (located on the last
page of this document). The signed acknowledgment form should be turned in and will be kept
on file at the facility granting the access. For questions on the Internet usage Policy, contact the
Information Technology (IT) Department.
ACKNOWLEDGMENT
Business Purpose
Name
8 Revision History