Page 30 - EE_Handbook__Final_Classical
P. 30

Together, we prepare people for work.



                   •      The email system and other technical resources owned by GESMN are not to be used to
                          create offensive messages and must not contain profane, vulgar, harassing, or defamatory
                          statements.
                   •      Internet users have a responsibility to use the internet appropriately in conducting GESMN
                          business. Examples of inappropriate use:
                          o  Illegally downloading files.
                          o  Sending threatening or harassing messages or files.
                          o  Accessing sites with offensive or illegal content.
                          o  Streaming or downloading multi-media such as YouTube or Pandora for non- business
                              use.
                          o  Attempting to access a computer system without authorization.
                          o  Using company time and resources for personal gain.



               NETWORK/COMPUTER SECURITY GUIDELINES
                   •      Access files, data, or other information appropriately.
                   •      Keep all accounts and passwords confidential (e.g., do not write them down, make sure they
                          are not easily identified, such as using your child’s name and make them as complicated as
                          possible by using a variety of characters).
                   •      Change your passwords on a regular basis.
                   •      Access and store credit card and other sensitive information in ways which meet PCI
                          compliance regulations.
                   •      Be aware that all electronic mobile devices which access GESMN information, whether
                          personal or owned by GESMN, are subject to electronic security policies, up to and including
                          complete remote data deletion. Employees are responsible for backing up data on their
                          mobile devices.

               Employees have no reasonable expectation of privacy when using GESMN property. GESMN and its
               technology partners reserve the right to monitor all employee email, voicemail, and/or internet usage to
               ensure compliance with this policy. GESMN may also access and/or disclose email messages or files of
               any employee to protect system security, fulfill organization obligations, detect employee wrongdoing,
               comply with legal processes, or protect the organization's rights or property.

               Violations of this policy may result in disciplinary action, up to and including termination of employment.
               It is permissible to use computers, email, and the internet for incidental personal purposes during an
               employee’s non-working time.

               For more information, see Acceptable Use of Information Technology Resources (A-011), Privacy and
               Business Confidentiality (A-009), Privacy Program (C-305), or Information Security (C-306) in the Policies
               and Procedures section on the organization’s intranet.


               SOCIAL MEDIA

         GESMN – Internal Use                                                    Human Resources                  27
   25   26   27   28   29   30   31   32   33   34   35