Information Security Violations Essay

425 Words1 Page

Our employees are advised to use our company’s internet connection for the following reasons: To complete their job duties. To seek out information that they can use to improve their work. To access their social media accounts, while conforming to our social media policy.Employees should: Keep their passwords secret always. Log into their corporate accounts only from safe devices. Use strong passwords to log into work-related websites and services.What is inappropriate employee internet usage?Our employees mustn’t use our network to: Download or upload obscene, offensive or illegal material. Send confidential information to unauthorized recipients. Invade another person’s privacy and sensitive information. Download or upload movies, music and …show more content…

Send unauthorized advertisements or solicitation emails. Sign up for a competitor’s services unless authorized. Our company has the right to monitor corporate emails. We also have the right to monitor websites employees visit on our computers.Disciplinary ActionEmployees who don’t conform to this employee internet usage policy will face disciplinary action. Serious violations will be cause for termination of employment, or legal action when appropriate. Examples of serious violations are: Using our internet connection to steal or engage in other illegal activities. Causing our computers to be infected by viruses, worms or other malicious software. Sending offensive or inappropriate emails to our customers, colleagues or partners.We advise our employees to: Use company-issued phones for business purposes only and preserve them in perfect condition. Surf the internet, text and talk on the phone only for a few minutes per day. Turn off or silence their phones when asked.We won’t allow employees to: Play games on the cell phone during working hours.Use their phones for any reason while driving a company vehicle. Use their cell phone’s camera or microphone to record confidential

More about Information Security Violations Essay

Open Document