Page 31 - PL Handbook 2016
P. 31

Purity Life will do its best to accommodate employee privacy while being as diligent and thorough as possible
when conducting investigations regarding company email and Internet usage.
	 •	 Internet access at Purity Life is managed via individual user accounts and confidential passwords. With
		 respect to account setup and network administration, unit managers are responsible for identifying and
		 recommending Internet access levels for staff members in their departments and for handing over that
		 information to the IT department.
	 •	 Users of Purity Life’s network resources are required to read this Internet policy and sign the agreement
		 prior to receiving an Internet access account and password. Passwords must be at least eight (8) characters		
		 long, contain both letters and numbers, and be changed every thirty (30) to sixty (60) days.
	 •	 All user names and passwords for Purity Life–owned and–operated devices must be supplied to the IT
		department.
	 •	Purity Life employees will be required to provide the IT department with a minimum of two security
		 questions/answers to be used in the event that a password is lost, forgotten, or compromised. These
		 security questions are intended to ensure the security of Purity Life’s Internet resources through
		 confirmation of an employee’s identity.
	 •	In the event that a Purity Life employee loses, forgets, or believes that their password has become
		 compromised, the employee must inform the IT department immediately. The IT department shall
		 confirm the user name, reset the password, and inform the employee of changes made, and the
		 procedures for changing their password.
	 •	In the event that an employee terminates their employment with Purity Life for any reason, Human
		 Resources shall provide notification to the IT department immediately to ensure the removal of the
		 former employee’s access to Purity Life email and Internet resources. This is an important measure in
		 protecting the safety and integrity of Purity Life resources.
Employees of Purity Life may use the Internet to complete their job duties, under the purview of Purity Life’s
business objectives. Personal use on breaks and lunch hour is permitted if the Company’s guidelines are followed.
Permissible, acceptable, and appropriate Internet-related work activities include:
	 1.	Researching, accumulating, and disseminating any information related to the accomplishment of the
		 user’s assigned responsibilities, during working hours or overtime.
	 2.	Collaborating and communicating with other employees, business partners, and customers of Purity Life,
		 according to the individual’s assigned job duties and responsibilities.
	 3.	Conducting professional development activities (e.g., news groups, chat sessions, discussion groups,
		 posting to bulletin boards, Web seminars, etc.) as they relate to meeting the user’s job requirements.
		 In instances where the personal opinions of the user are expressed, a disclaimer must be included
		 asserting that such opinions are not necessarily those of Purity Life.
	 4.	(During personal time or working-from-home situations) Retrieving non-job–related information to develop
		 or enhance Internet-related skills, under the assumption that these skills will be used to improve the
		 accomplishment of job-related work duties and responsibilities.
Security
Any and all passwords shall not be disclosed to, or shared with, other users or third parties. Any and all Internet
accounts are to be accessed only by their assigned users for legitimate business purposes. Users shall not
attempt to obtain anyone else’s account password. If a user has reason to believe his/her password has been
compromised, the user must inform the IT department immediately. Users are required to take all necessary
precautions to prevent unauthorized access to Internet services.
Furthermore, all Internet users at Purity Life must comply with the following security guidelines, rules, and regulations:
	 1.	Users must refrain from any online practices or procedures that would expose the network or resources
		 to virus attacks, spyware, adware, malware, or hackers.
	 2.	Users are responsible for familiarizing themselves with procedures for downloading and protecting information
		 in a secure manner, as well as for identifying and avoiding any online material deemed sensitive, private,
		 and copyrighted.

                                                                                    Purity Life Employee Handbook EDITION 2 - 2016 31
   26   27   28   29   30   31   32   33   34   35   36