Page 126 - Gulf Coast Division - Training Manual 5 -18
P. 126
• Mobile devices without PIN/Passcode and automatic screen locking enabled will not be allowed access to the
Ben E. Keith network by automated access rules.
• Rooted or jailbroken devices are strictly forbidden from accessing the company network, applications, and
services. (Rooting and Jailbreaking both refer to the process of removing or circumventing controls that were put
in place by the device manufacturer to protect the security and stability of the system. This can lead to an
increased vulnerability to malicious software applications.) See your local I.T. person for further explanation.
• Employees’ access to company data and systems is limited based on security access profiles defined by I.T. and
automatically enforced.
• The physical security of mobile devices is the responsibility of the employee. Devices should be kept in the
employee’s physical presence whenever possible. Whenever a device is being stored, it should be stored in a
secure place, preferably out-of-sight.
Your Responsibilities
• Read this policy and present a signed copy to your HR or IT department.
• Bring your device(s) to I.T. for proper provisioning and configuration.
• Use your devices in an ethical manner at all times and adhere to the company’s acceptable use policy as
outlined above.
• Backup all data on your personal devices.
• You are responsible for all costs associated with your personally owned devices.
• If your mobile device is lost or stolen, immediately report the incident to your local Ben E. Keith I.T.
representative. You must also immediately change your network password to further guard against
unauthorized network access. Your I.T. Manager will “remote wipe” the missing device to ensure that others
cannot access the BEK data on the device or your personal information. (This involves issuing a command over
the airwaves to return the device back to its factory default state, thereby deleting all user data.)
• Protect all company data and do not allow unauthorized persons access to it.
• Upon termination of your employment with Ben E. Keith, you must destroy all company data on your personal
devices, or otherwise in your possession.
Other Disclaimers
• The company reserves the right to disconnect devices or disable services without notification.
• Your device may be remotely wiped if you terminate your employment, or if I.T. detects a data or policy breach,
a virus, or similar threat to the security of the company’s data and technology infrastructure. The decision to
remote wipe a device will be made on a case-by-case basis depending on the circumstances, to include the
assessment of the security risk.
Managers and supervisors are responsible for ensuring that users are aware of and understand this policy and all
related procedures. Anyone observing what appears to be a breach of security, violation of this policy, violation of
law, theft, damage, or any action placing Ben E. Keith resources at risk must immediately report the incident to an
appropriate level supervisor or manager within their organization. Ben E. Keith Company reserves the right to take
appropriate disciplinary action up to and including termination for noncompliance with this policy.
Signature Printed Name Date
2