Académique Documents
Professionnel Documents
Culture Documents
1 of 16 IT-SEC-0003
INFORMATION SECURITY DEPARTMENT
Refer to the DynamicPolicy system for the latest revision of this document. Printed copies are valid only for
the day on which the document was printed. For the current version, version number and effective date,
always refer to DynamicPolicy, where documents are periodically updated. Policy owners can track
approvers’ reviews and comments in the system.
Author(s):
Jose De Jesus Sr. Director, Information Security
Contributor(s):
Obed Rodriguez VP, Information Security & Corporate Compliance
Distribution List:
All Employees
10/31/06
11/21/06
12/06/06
This policy is the confidential and proprietary product of TracFone Wireless, Inc. Any unauthorized use,
reproduction or transfer of this policy is strictly prohibited. Copyright © 2011 by TracFone Wireless, Inc.
(subject to limited distribution and restricted disclosure only.) All rights reserved.
Last updated 3/24/17
END-USER COMPUTING POLICY Page Doc. No.:
2 of 16 IT-SEC-0003
INFORMATION SECURITY DEPARTMENT
2015 review:
Section 6.15 - VPN access now requested and
provisioned through OIM;
PCI DSS references updated for PCI version 3.1 Jose De Jesus 8/14/15
New sections for:
Acceptable Data Storage Locations
DLP Agent
Information Security Awareness Training
2016 review:
HITRUST CSF references added
Section 3 expanded Jose De Jesus 6/28/16
Section 6.14 expanded
Section 6.17 expanded
This policy is the confidential and proprietary product of TracFone Wireless, Inc. Any unauthorized use,
reproduction or transfer of this policy is strictly prohibited. Copyright © 2011 by TracFone Wireless, Inc.
(subject to limited distribution and restricted disclosure only.) All rights reserved.
Last updated 3/24/17
END-USER COMPUTING POLICY Page Doc. No.:
3 of 16 IT-SEC-0003
INFORMATION SECURITY DEPARTMENT
TABLE OF CONTENTS
Executive Summary .......................................................................................................... 5
1. Purpose ..................................................................................................................... 5
2. Scope......................................................................................................................... 5
3. Introduction and Security Framework .................................................................... 5
4. Responsibilities ........................................................................................................ 6
4.1 Employees and Contractors ................................................................................................................6
4.2 Managers and Supervisors ..................................................................................................................6
4.3 Business Owners ..................................................................................................................................6
4.4 Service Desk ..........................................................................................................................................7
5. Policy Enforcement .................................................................................................. 7
6. General Information Security .................................................................................. 7
6.1 Roles and Responsibilities of Users ...................................................................................................7
6.2 Use of Systems .....................................................................................................................................7
6.3 Privacy ...................................................................................................................................................7
6.4 User Network Access ...........................................................................................................................7
6.4.1 New Employees, Consultants, Vendors and Temporary Employees ..............................................7
6.4.2 Consultant and Temporary Employee Extension .............................................................................7
6.4.3 Employee Termination and Consultant/Temporary Employee End of Engagement .......................8
6.5 User Application Access ......................................................................................................................8
6.6 Login/Logoff Process ...........................................................................................................................8
6.7 User Passwords ....................................................................................................................................8
6.8 Software/Hardware Usage ....................................................................................................................9
6.9 Acceptable Data Storage Locations .....................................................................................................9
6.10 Antivirus Security .............................................................................................................................10
6.11 DLP (Data Leakage Prevention) Agent ............................................................................................10
6.12 System Access – Other Considerations ..........................................................................................10
6.12.1 Anonymous Access ......................................................................................................................10
6.12.2 Unauthorized Access Attempts ....................................................................................................10
6.13 Internal Network Isolation .................................................................................................................10
6.14 Files, Data and Printer Output and Mailing .....................................................................................10
6.15 Remote Access ..................................................................................................................................11
6.16 Wireless Networks .............................................................................................................................11
6.17 Information Security Awareness Training .......................................................................................12
6.18 Data Center Security ..........................................................................................................................12
7. E-Mail Usage ........................................................................................................... 13
7.1 Authorized E-Mail Usage .....................................................................................................................13
8. Internet Usage ........................................................................................................ 14
8.1 Information Integrity ...........................................................................................................................14
8.2 Authorized Internet Usage .................................................................................................................14
9. User Compliance .................................................................................................... 14
This policy is the confidential and proprietary product of TracFone Wireless, Inc. Any unauthorized use,
reproduction or transfer of this policy is strictly prohibited. Copyright © 2011 by TracFone Wireless, Inc.
(subject to limited distribution and restricted disclosure only.) All rights reserved.
Last updated 3/24/17
END-USER COMPUTING POLICY Page Doc. No.:
4 of 16 IT-SEC-0003
INFORMATION SECURITY DEPARTMENT
This policy is the confidential and proprietary product of TracFone Wireless, Inc. Any unauthorized use,
reproduction or transfer of this policy is strictly prohibited. Copyright © 2011 by TracFone Wireless, Inc.
(subject to limited distribution and restricted disclosure only.) All rights reserved.
Last updated 3/24/17
END-USER COMPUTING POLICY Page Doc. No.:
5 of 16 IT-SEC-0003
INFORMATION SECURITY DEPARTMENT
Executive Summary
TracFone Wireless, Inc. provides computer equipment and communication systems for the purpose of
conducting company business. All TracFone messaging, communications, data storage and network
systems, including voice mail and email, are the sole property of TracFone. Unauthorized use of TracFone
property is prohibited.
TracFone can and will exercise its right to access, review, remove, audit, monitor, intercept and disclose
messages, data or information that is created, sent, received or stored on any such systems. TracFone may
also release, publicize or disclose such information obtained for business reasons at its discretion.
Any employee who violates any provision of this policy may be subject to disciplinary action.
TracFone reserves the right to amend, modify, replace, terminate or make specific exceptions to this policy
any time, without prior notice to employees. Changes to this policy will be communicated to employees via
the DynamicPolicy system and to consultants and temporary employees by Vendor Staffing.
All new TracFone employees and consultants (including temporary employees) are provided a copy of the
End User Computing Policy prior to accessing the TracFone network. Employees and consultants must
agree to comply with this policy as a condition of their employment/engagement.
1. Purpose
The purpose of this policy is to provide specific Information Security (“InfoSec”) policies and guidelines
necessary for a secure computing environment for TracFone employees and consultants. InfoSec has
developed this policy with the objective of maintaining adequate data and system availability, integrity and
confidentiality.
2. Scope
This policy applies to all operating departments, employees, consultants and business partners of TracFone
Wireless, Inc.
Information and information systems are critical and vitally important assets. Without reliable and properly
secured information and information systems, business operations would be severely disrupted. Likewise,
the preservation and enhancement of the company’s reputation is directly linked to the way in which both
information and information systems are managed.
To be effective, information security should be a team effort involving the active participation and support of
every user who deals with information and/or information systems. In recognition of the need for teamwork,
this Information Security policy clarifies the responsibilities of users as well as the steps they should take to
help protect information and information systems. This document provides a framework and guideline for
TracFone users to make appropriate use of our systems and network.
This policy is the confidential and proprietary product of TracFone Wireless, Inc. Any unauthorized use,
reproduction or transfer of this policy is strictly prohibited. Copyright © 2011 by TracFone Wireless, Inc.
(subject to limited distribution and restricted disclosure only.) All rights reserved.
Last updated 3/24/17
END-USER COMPUTING POLICY Page Doc. No.:
6 of 16 IT-SEC-0003
INFORMATION SECURITY DEPARTMENT
Every user must comply with the information security policies found in this and related information security
and corporate governance documents, such as the Employee Handbook, Code of Business Conduct, etc.
The security framework represented by this policy has been created to satisfy the following elements:
TracFone will grant access to company systems based on the principles of least privilege and deny by
default. All relevant applications to the business have pre-defined roles and responsibilities that govern
users’ access to ensure that users only receive the minimum access needed to perform their job duties.
(HITRUST CSF 01.v) Authorization to access information and/or systems must be requested in accordance
with the company’s Information Security policies, standards and procedures.
4. Responsibilities
Departments and individuals have varying levels of responsibility to minimize the risk of unauthorized use,
disruption, modification, disclosure or misuse of information and technology assets.
This policy is the confidential and proprietary product of TracFone Wireless, Inc. Any unauthorized use,
reproduction or transfer of this policy is strictly prohibited. Copyright © 2011 by TracFone Wireless, Inc.
(subject to limited distribution and restricted disclosure only.) All rights reserved.
Last updated 3/24/17
END-USER COMPUTING POLICY Page Doc. No.:
7 of 16 IT-SEC-0003
INFORMATION SECURITY DEPARTMENT
5. Policy Enforcement
Violation of the End-User Computing Policy or of the standards and procedures established in support of this
policy is grounds for disciplinary action. If any associate, employee, manager or contractor suspects or
witnesses a violation of this policy, he/she must contact their Supervisor, Human Resources Representative
or InfoSec immediately. Failure to do so constitutes a violation of TracFone’s Information Security policy.
6.3 Privacy
Unless contractual agreements dictate otherwise, data sent over company computer and
communications systems are the property of TracFone. To protect and manage TracFone’s data assets,
management reserves the right to examine at any time and without prior notice all data stored or
transmitted. Users should have no expectation of privacy associated with the information they store or
send through TracFone systems.
This policy is the confidential and proprietary product of TracFone Wireless, Inc. Any unauthorized use,
reproduction or transfer of this policy is strictly prohibited. Copyright © 2011 by TracFone Wireless, Inc.
(subject to limited distribution and restricted disclosure only.) All rights reserved.
Last updated 3/24/17
END-USER COMPUTING POLICY Page Doc. No.:
8 of 16 IT-SEC-0003
INFORMATION SECURITY DEPARTMENT
complete the extension form, obtaining required signatures before submitting the form to Vendor
Staffing. The extension must be approved via OIM.
For Business Intelligence (BI), Oracle Financials System (OFS) and MAX, the employee or
consultant submits the access provision/change request through OIM for electronic approval. A
substantiated business reason for this access must be documented on the request. The
requestor must agree to comply with FCC regulations over access to MAX Call Detail Records.
For Database Access, the employee or consultant completes the “Database Tools Access
Request Form”. Requests for access to sensitive data must be justified on the form and will be
carefully reviewed by Information Security. In order to obtain MAX database access, a user
must also fill out the “MAX Database Access Request Form – Supplemental” to provide a
substantiated business reason to access Call Detail Records (CDRs) and to acknowledge
compliance with FCC regulations when accessing CDRs. Once the form(s) have been fully
signed/approved, the database account will be created by the Database Support Services Team.
For access to the APEX Oracle front-end database application, a user completes the “APEX
Tools Access Request Form”. Once the form has been fully signed/approved, the database
account will be created by the Database Support Services Team.
Positive identification for users originating external real-time connections to TracFone systems or
networks via value added networks, public networks (Internet), or any other external communications
system may also involve additional user authentication techniques.
Employees will lock up all systems, when leaving their desks for meetings, breaks, lunches, etc. At the
end of the day, employees will log out of or lock all systems.
This policy is the confidential and proprietary product of TracFone Wireless, Inc. Any unauthorized use,
reproduction or transfer of this policy is strictly prohibited. Copyright © 2011 by TracFone Wireless, Inc.
(subject to limited distribution and restricted disclosure only.) All rights reserved.
Last updated 3/24/17
END-USER COMPUTING POLICY Page Doc. No.:
9 of 16 IT-SEC-0003
INFORMATION SECURITY DEPARTMENT
Password standards, such as those addressing minimum length and complexity, are enforced on all
systems and applications. All user-chosen passwords must contain at least one alphabetic, at least one
upper case, and one non-alphabetic character (including numbers and punctuation), depending on the
application or system. Users may not reuse the same passwords and are required to change their
password after a certain period of time. Upon first login, when a new user is issued a user id and
password, the user must change his/her password. Users should not write down their passwords.
Users are limited in the number of unsuccessful login attempts before their account is locked. The
system will automatically lock the screen and suspend the session after a period of idle time; the user
must re-enter his network password to re-establish the session. Users who have not logged on or
changed their passwords for an extended period of time will have their accounts disabled.
Note: Some applications or systems cannot be fully configured as above due to system limitations.
Users are not permitted to download software from electronic bulletin board systems, the Internet, or
other systems outside of the company unless specifically authorized by the InfoSec Department.
Authorized downloads can be made only on systems in which current anti-virus software is installed and
functioning, as determined by the InfoSec Department.
Users may not install any software on the company's personal computers, network servers, or other
machines (such as laptops and stand-alone computers) without first receiving advanced written
authorization from the InfoSec Department.
Users who have a valid business reason to have administrative rights to their assigned computer
equipment (laptop or desktop) must request administrative privileges (admin rights) via an OIM request.
The request must include a substantial business justification. The necessary approvals will be obtained
via OIM.
Strict adherence to software vendors' license agreements and copyright holders' notices is required.
Users are forbidden from making unauthorized copies of software.
Computer equipment provided by the company must not be altered or added to in any way without
authorization from the InfoSec Department. In addition, users must not bring their own computers
(including laptops), computer peripherals or computer software into company facilities without advance
written authorization from their manager and the InfoSec Department.
The use of Cloud storage is strictly forbidden. Any user with a valid business reason for considering the
use of Cloud based storage solutions must request Information Security review and approval of the use
of such services.
This policy is the confidential and proprietary product of TracFone Wireless, Inc. Any unauthorized use,
reproduction or transfer of this policy is strictly prohibited. Copyright © 2011 by TracFone Wireless, Inc.
(subject to limited distribution and restricted disclosure only.) All rights reserved.
Last updated 3/24/17
END-USER COMPUTING POLICY Page Doc. No.:
10 of 16 IT-SEC-0003
INFORMATION SECURITY DEPARTMENT
Computer equipment infected by viruses will be removed from the network until the equipment is free of
viruses. If an employee or consultant’s equipment becomes infected multiple times in a short period of
time, his/her equipment will be examined to determine the possible cause of repeated infection. If the
employee or consultant has admin rights to his/her equipment and it is determined that virus infection
has been caused by downloading unauthorized software, admin rights may be revoked. If the virus
infection has been caused by frequent visits to a website that has been compromised or that is
determined to have links that contain malware, access to such website will be blocked.
In order for the Data Leakage Prevention system to monitor and prevent the unauthorized use and/or
distribution of TracFone sensitive data, all TracFone issued workstations (desktop and laptop) will have
the Symantec DLP Agent installed and functional. End-users shall not tamper with, disable or otherwise
make inoperable the Symantec DLP agent. For additional information refer to the Data Leakage
Prevention and Data Classification Guidelines.
Incidents involving system cracking, password cracking, file decryption, bootleg software copying or
similar unauthorized attempts to compromise security measures may be unlawful and will be
considered serious violations of TracFone’s Information Security policy.
Access to the internal network resources is set up by the InfoSec Department through enforcing role-
based security. Responsibilities are granted in a manner that will reduce risk, protect TracFone’s assets
and minimize liability.
This policy is the confidential and proprietary product of TracFone Wireless, Inc. Any unauthorized use,
reproduction or transfer of this policy is strictly prohibited. Copyright © 2011 by TracFone Wireless, Inc.
(subject to limited distribution and restricted disclosure only.) All rights reserved.
Last updated 3/24/17
END-USER COMPUTING POLICY Page Doc. No.:
11 of 16 IT-SEC-0003
INFORMATION SECURITY DEPARTMENT
Users are responsible for picking up their printed output from printers, copiers and facsimile machines in
a timely fashion to avoid theft, disposal or unintentional exposure and display of information contained
therein. Sensitive or critical business information must not be left unattended or available for
unauthorized individuals to access.
When transporting printed documents with sensitive information within the facilities and through inter-
office mail, ensure that the information is not viewable through envelope windows and mark envelopes
according to the classification of the information (e.g., “Confidential”).
It is prohibited to mail sensitive information, such as protected health information or credit card data, via
US mail, overnight delivery services, etc. Any received mail containing sensitive information must be
immediately protected, and the employee must advise the sender of TracFone’s policy prohibiting the
receipt of unprotected sensitive information. (HITRUST CSF 01.h)
The use of any wireless device (routers, wireless cards, etc.) that allows for wireless connectivity to the
company network is strictly forbidden, as this represents unauthorized technologies that pose many
inherent risks to the safeguarding of TracFone data and the security of the internal network.
The installation or activation of wireless network interface cards on company desktops or laptops is
strictly prohibited. Any equipment that has an enabled wireless network card must not also have an
This policy is the confidential and proprietary product of TracFone Wireless, Inc. Any unauthorized use,
reproduction or transfer of this policy is strictly prohibited. Copyright © 2011 by TracFone Wireless, Inc.
(subject to limited distribution and restricted disclosure only.) All rights reserved.
Last updated 3/24/17
END-USER COMPUTING POLICY Page Doc. No.:
12 of 16 IT-SEC-0003
INFORMATION SECURITY DEPARTMENT
enabled wired network card, since the presence of both wired and wireless cards can create a potential
bridge between the two networks.
While we realize that consultants, visitors or vendors may have a valid need to use wireless technology,
such use is limited to wireless data cards on equipment that is not physically plugged into the TracFone
internal network.
Employees receive this training online via the corporate training system.
Information Security provides the security awareness training material to the Human
Resources contact for uploading into the training system.
The mandatory course is followed by a short quiz to validate the student’s understanding of
the material. A passing score of 80% or more is required. If the student does not pass with a
score of at least 80%, the training system requires the user to repeat the training until a
passing score is achieved.
Upon hire, new employees are enrolled by Human Resources in the online security awareness training.
The training system notifies the new employees and their managers via email of the mandatory training
course. Past due notices are emailed to non-compliant employees and their managers for follow-up.
Annually, all employees must repeat the security awareness online training course, even if the employee
successfully completed it during the prior year.
Information Security reviews and updates the course, as applicable, and submits the
presentation and quiz to the Human Resources contact for uploading into the corporate
training system.
Human Resources enrolls employees in the online training course.
Human Resources management announces the mandatory course to all employees via
email with a designated completion date.
Past due notices are emailed to non-compliant employees and their managers for follow-up.
HR generates reports from the training system indicating employees’ completion status for
Information Security to follow up on non-compliance and to escalate as needed.
All new hires also attend a New Hire Orientation session that includes Information Security Awareness
training.
No one without a current TracFone employee or contractor identification will be allowed unescorted
access in the Miami Data Center. If the contractor is not one of our existing vendors/contractors, he will
be accompanied by IT personnel or a Security Guard.
This policy is the confidential and proprietary product of TracFone Wireless, Inc. Any unauthorized use,
reproduction or transfer of this policy is strictly prohibited. Copyright © 2011 by TracFone Wireless, Inc.
(subject to limited distribution and restricted disclosure only.) All rights reserved.
Last updated 3/24/17
END-USER COMPUTING POLICY Page Doc. No.:
13 of 16 IT-SEC-0003
INFORMATION SECURITY DEPARTMENT
Refer to the “Miami Data Center Policy and Procedures” for further details.
7. E-Mail Usage
TracFone provides its employees and certain vendors with electronic mail communications. Use of company
e-mail constitutes acceptance of this policy. Refer as well to other corporate policies, such as the Employee
Handbook and Code of Business Conduct.
The network username and password used to access e-mail is the responsibility of the individual to whom it
is assigned. Any authorized use of the network user credentials by other individuals to gain access to the
network and e-mail makes that user responsible for any and all actions of those individuals.
Electronic communication systems are company property. The company has provided these systems for
use in conducting company business. All communications and information transmitted by, received from,
passing through or stored in these systems are company records and the exclusive property of the company.
Users need to be aware that deletion of any e-mail messages and attachments may not truly eliminate
the messages and attachments from the systems. All e-mail messages and attachments are stored on a
central back-up system in the normal course of data management.
Even though TracFone has the right to retrieve and read any e-mail messages, those messages should
still be treated as confidential by other users and be accessed only by the intended recipient. Unless
specifically authorized by the appropriate personnel, users are prohibited from retrieving or reading any
e-mail messages that are not directly sent to them.
Users are reminded that electronic communications systems are not encrypted by default. If sensitive
information should be sent by electronic communication systems, encryption or similar technologies to
protect the data must be employed.
Users must not use profanity, obscenities or derogatory remarks in electronic mail messages discussing
employees, customers, competitors or others. Such remarks, even when made in jest, may create legal
problems such as trade libel and defamation of character.
Company policies against sexual or other harassment apply fully to the electronic communication
systems. No messages should be created, sent, forwarded or received on any of the electronic
communication systems if they contain intimidating, hostile or offensive material concerning sex, race,
color, national origin, religion, sexual orientation, age, marital status, disability or any other classification
protected by law. Any message received that contains intimidating, hostile or offensive material should
be reported immediately to the Information Security Department so that appropriate measures can be
taken to prevent future violations of this policy.
Recognizing that some information is intended for specific individuals and may not be appropriate for
general distribution, electronic communications users should exercise caution when forwarding
This policy is the confidential and proprietary product of TracFone Wireless, Inc. Any unauthorized use,
reproduction or transfer of this policy is strictly prohibited. Copyright © 2011 by TracFone Wireless, Inc.
(subject to limited distribution and restricted disclosure only.) All rights reserved.
Last updated 3/24/17
END-USER COMPUTING POLICY Page Doc. No.:
14 of 16 IT-SEC-0003
INFORMATION SECURITY DEPARTMENT
messages. Blanket forwarding of messages to outside parties is prohibited unless prior permission from
the Human Resources Department has been obtained.
Users shall not use their company email account to register with or subscribe to any Internet website or
service (newsletters, promotions, marketing, etc.) unless authorized by the InfoSec Department.
Electronic registration of Internet services will likely result in the account being acquired by spammers
and junk mailers.
8. Internet Usage
Access to the Internet through the company network is a privilege and carries responsibilities reflecting
responsible and ethical use. Internet access is granted to all employees and contractors. Use of the Internet
through the network constitutes the individual’s acceptance of this policy. Refer as well to the corporate
Employee Handbook and Code of Business Conduct policies.
Misrepresenting, obscuring, suppressing or replacing a user's identity on the Internet or any company
electronic communications system is forbidden. The user name, electronic mail address, company
affiliation and related information included with messages or postings should reflect the actual originator
of the messages or postings.
All information taken off the Internet should be confirmed by separate information from another source.
There is no quality control process on the Internet, and a considerable amount of its information is
outdated and inaccurate, and in some instances even deliberately misleading. Accordingly, before
using free Internet-supplied information for business decision-making purposes, users should consider
the source of the information and corroborate the information by consulting other sources.
Connecting to certain non-business web sites is prohibited. Users of company computers who discover
they have connected with a web site that contains sexually explicit, racist, violent or other potentially
offensive material should immediately disconnect from that site. The ability to connect to a specific web
site does not in itself imply that users of company systems are permitted to visit that site.
9. User Compliance
Users are responsible for complying with this policy and all other TracFone policies defining computer and
network security measures.
This policy is the confidential and proprietary product of TracFone Wireless, Inc. Any unauthorized use,
reproduction or transfer of this policy is strictly prohibited. Copyright © 2011 by TracFone Wireless, Inc.
(subject to limited distribution and restricted disclosure only.) All rights reserved.
Last updated 3/24/17
END-USER COMPUTING POLICY Page Doc. No.:
15 of 16 IT-SEC-0003
INFORMATION SECURITY DEPARTMENT
The following forms apply to this policy and procedure. They are directly or indirectly noted within this
document and are accessible on the corporate Intranet \ Company Forms. This list constitutes the OFFICIAL
form list for this policy and procedure.
Form Reference
No. Form Name Purpose
IT-SEC-0003/0001 Clarify/WebCSR Authorization for assignment of Clarify/TAS
Application Access roles/security groups
Request Form
This policy is the confidential and proprietary product of TracFone Wireless, Inc. Any unauthorized use,
reproduction or transfer of this policy is strictly prohibited. Copyright © 2011 by TracFone Wireless, Inc.
(subject to limited distribution and restricted disclosure only.) All rights reserved.
Last updated 3/24/17
END-USER COMPUTING POLICY Page Doc. No.:
16 of 16 IT-SEC-0003
INFORMATION SECURITY DEPARTMENT
All new TracFone employees and consultants (including temporary employees) are provided a copy of the
End-User Computing Policy prior to accessing the TracFone network. Employees and consultants must
agree to comply with this policy as a condition of their employment/engagement.
In complying with the TracFone End-User Computing Policy, employees and consultants are to be
particularly aware of the following important controls aimed at reducing the company’s exposure to security
risks:
1. Wireless connectivity to the TracFone network is not permitted. The use of any device
(routers, wireless cards, etc.) that allows for wireless connectivity to the company network is
not permitted.
Employees will also confirm their acceptance of the current End-User Computing Policy (and future updates)
electronically through the DynamicPolicy system, available via the corporate Intranet. Any employee who
violates this Policy may be subject to disciplinary action, up to and including discharge.
By signing below, I acknowledge that I have received and will fully comply with the TracFone End-User
Computing Policy.
12/18/19
_____________________________________ _______________
Employee/Consultant Signature Date
DANA A REED
_____________________________________
Printed Name
This policy is the confidential and proprietary product of TracFone Wireless, Inc. Any unauthorized use,
reproduction or transfer of this policy is strictly prohibited. Copyright © 2011 by TracFone Wireless, Inc.
(subject to limited distribution and restricted disclosure only.) All rights reserved.
Last updated 3/24/17