Page 61 - ITM Employee Handbook September 2020
P. 61

•  Protecting and maintaining network and system security.
                   •  Maintaining system performance and availability.
                   •  Ensure the privacy and integrity of information stored on the Company’s network.
                   •  Investigating actual and suspected security incidents.
                   •  Preventing, detecting and minimising inappropriate use.
                   •  Protecting the rights and property of the Company, its employees, customers and clients.
                   •  Ensuring compliance with Company policies, current legislation and applicable regulations.
                   •  While the Company does  not routinely  monitor an  individual user’s use  of its electronic
                       communications, email and internet activity it reserves the right to do so when a breach of its
                       policies or illegal activity is suspected.
                   •  In the process of dealing with computer support calls, if necessary, the Company’s selected
                       ICT provider,  may need to access a user’s computer to resolve  the support call. In such
                       circumstances ICT provider staff must respect the privacy of the individual user and not access
                       information, documents or emails of a personal nature without the user’s permission or unless
                       they need to in order to resolve the support call. In some cases, the ICT provider may use
                       remote control software to connect and take control of a user’s computer remotely. In such
                       circumstances the ICT staff will not use this software to connect to the user’s computer
                       without first attempting to contact the user of the computer first.

               Personal Use:
               The Company’s electronic communications, email and internet services are to be used for business-
               related purposes only. Under no circumstances can access to Company Wi-if be afforded to any non-
               member of staff.

               Email and Messenger Services
               The primary purpose  of  the Company’s email  and messenger system is to promote effective
               communication  on Company business matters. Authorised users  may be granted access  to  email
               services subject to the requirements of their role within the Company.

                   •  Users must respect the privacy of others at all times and only use email accounts that have
                       been issued to them.
                   •  Users  who use the  email system for personal  use  must ensure they  present their
                       communications in such a way that it is clear to the recipient that the email is of a personal
                       nature and is not a communication on behalf of the Company.
                   •  Users should be careful when using their Company email account to send personal messages
                       that their words or actions do not have a negative impact on the Company in any way.
                   •  Only email facilities provided by the Company may be used in connection with an individual
                       user work for the Company. The use of third-party web-based email  services for the
                       transmission of Company confidential or restricted information is strictly prohibited.
                   •  Access to third party web-based email servers is not allowed using the Company network.
                       However, email messages can be sent from the Company network to third party web-based
                       email servers, but it should be noted that this is not a secure method of sending information.
                   •  For security reasons  users who  regularly receive  Company  confidential  or restricted
                       information via email must not forward their Company email messages to their own personal
                       third-party web-based email account.
                   •  Users should ensure they keep their personal email messages separate from their Company
                       business related email messages.
                   •  All email accounts maintained on the Company’s email system are the property of the
                       Company.



                                                          60
   56   57   58   59   60   61   62   63   64   65   66