Vous êtes sur la page 1sur 2

Internet Acceptable Usage Policy

The provision of an efficient and reliable computing and networking service is dependent on the cooperation of all users. It is important to remember that security problems on the Internet are undeniable, posing a threat to <Client Name> resources and information. Users should be aware of their responsibilities to other users and providers of services and that their behaviour should reflect and maintain <Client Name>s professional standards. Adherence to this policy will help prevent legal proceedings being taken against the Society and its employees Accordingly users must use the resource in a responsible manner and must respect the integrity of computer systems, networks and data to which they have access and any rules and regulations governing their use. In particular be aware that: A B You must not engage in activities which waste resources (people, networks, computers) or which are liable to cause a disruption or denial of service to other users. Internet services e.g. e-mail and browsing are provided by <Client Name> primarily for business use. These tools are provided to help staff in their duties. Provided it does not interfere with business duties or contravene this policy, occasional and reasonable personal use is permitted. Any executable file i.e. files with extensions including exe, com, dll, scr, ocx downloaded from the Internet must not be loaded on any PC without approval by Technology Supports' Desktops team.
Technology staff do not require this approval for loading any software onto PC/Servers in development environments, however the change must be recorded in the configuration log for the PC/Server.

D E F G

You must not transmit confidential or proprietary information or respond to newsgroups unless it has been through the same sign-off procedures as if it were a paper publication. You must not use computer or network resources to access, store or distribute offensive or obscene material. You must not use the Internet for any form of communication that may be deemed as harassment or intimidation. You must not communicate statements about other people or companies that are based on rumour or exaggerated. All information should be presented in a clear way so it cannot be misunderstood. It is important to remember that electronic communication should receive the same degree of care and consideration as paper communication. Either can be subject to a Libel claim. You must keep copies of all important documents transmitted and received electronically on disk. E-mail can be produced in Court as evidence and will have to be disclosed to opponents in litigation. Unless specifically authorised to do so by Information Security Department, you must not use the Internet for the creation of legal or contractual obligations. You must not store, disclose or transmit any personal data without specific authority from the Data Protection Officer, or you may face prosecution for breach of the Data Protection Act. You must not use, or knowingly allow any other person to use your access for any activities of an illegal or fraudulent nature. You must not store, transfer or cause to be transferred, reproduce or make available for distribution any material which is subject to and in contravention of the Copyright, Designs and Patents Act 1988. You must have the permission of the copyright owner before using copyrighted material in this way.

H I J K L

IS/EC/FORM/0001

Version 2.0 Approved 23/07/1999

Internet Acceptable Usage Policy


M N O P All network traffic will be logged and analysed. Network traffic may be monitored for actions that breach this Acceptable Usage Policy or for purposes of backup and problem solving. The Acceptable Usage Policy will be reviewed from time to time and any new regulations will be communicated to all existing users. Any of the following activities may result in criminal prosecution:attempts at hacking across networks publishing of offensive or misleading statements. failure to comply with the Data Protection Act, Copyright, Design and Patents Act or the Defamation Act You may also be held liable for all costs and damages, attributable to your unauthorised activities or disruptions.
Q

While using any standalone Internet connection, you must treat any files downloaded as from an untrusted source, and should ensure they are virus checked on a <Client Name> designated Virus scanner before placing on any other <Client Name> PC or Server. In addition any executable file i.e. files with extensions including exe, com, dll, scr, ocx downloaded from the Internet must not be loaded on any PC without approval by Technology Supports' Desktops team. Technology staff do
not require this approval for loading any software onto PC/Servers in development environments, however the change must be recorded in the configuration log for the PC/Server.

I have read and understood the above and I will accept and adhere to this usage policy and subsequent revisions that are notified to me. I also understand that failure to comply with this usage Policy may result in the service being withdrawn and disciplinary action taken against me.

Signature:

Date:

Name:

Employee: Number

Department

IS/EC/FORM/0001

Version 2.0 Approved 23/07/1999

Vous aimerez peut-être aussi