Page 126 - Gulf Coast Division - Training Manual 5 -18
P. 126

•  Mobile devices without PIN/Passcode and automatic screen locking enabled will not be allowed access to the
               Ben E. Keith network by automated access rules.
            •  Rooted or jailbroken devices are strictly forbidden from accessing the company network, applications, and
               services.  (Rooting and Jailbreaking both refer to the process of removing or circumventing controls that were put
               in place by the device manufacturer to protect the security and stability of the system.  This can lead to an
               increased vulnerability to malicious software applications.) See your local I.T. person for further explanation.
            •  Employees’ access to company data and systems is limited based on security access profiles defined by I.T. and
               automatically enforced.
            •  The physical security of mobile devices is the responsibility of the employee.  Devices should be kept in the
               employee’s physical presence whenever possible.  Whenever a device is being stored, it should be stored in a
               secure place, preferably out-of-sight.

        Your Responsibilities

            •  Read this policy and present a signed copy to your HR or IT department.
            •  Bring your device(s) to I.T. for proper provisioning and configuration.
            •  Use your devices in an ethical manner at all times and adhere to the company’s acceptable use policy as
               outlined above.
            •  Backup all data on your personal devices.
            •  You are responsible for all costs associated with your personally owned devices.
            •  If your mobile device is lost or stolen, immediately report the incident to your local Ben E. Keith I.T.
               representative.  You must also immediately change your network password to further guard against
               unauthorized network access.  Your I.T. Manager will “remote wipe” the missing device to ensure that others
               cannot access the BEK data on the device or your personal information. (This involves issuing a command over
               the airwaves to return the device back to its factory default state, thereby deleting all user data.)
            •  Protect all company data and do not allow unauthorized persons access to it.
            •  Upon termination of your employment with Ben E. Keith, you must destroy all company data on your personal
               devices, or otherwise in your possession.

        Other Disclaimers
            •  The company reserves the right to disconnect devices or disable services without notification.
            •  Your device may be remotely wiped if you terminate your employment, or if I.T. detects a data or policy breach,
               a virus, or similar threat to the security of the company’s data and technology infrastructure.  The decision to
               remote wipe a device will be made on a case-by-case basis depending on the circumstances, to include the
               assessment of the security risk.

            Managers and supervisors are responsible for ensuring that users are aware of and understand this policy and all
            related procedures.  Anyone observing what appears to be a breach of security, violation of this policy, violation of
            law, theft, damage, or any action placing Ben E. Keith resources at risk must immediately report the incident to an
            appropriate level supervisor or manager within their organization.  Ben E. Keith Company reserves the right to take
            appropriate disciplinary action up to and including termination for noncompliance with this policy.





        Signature                                Printed Name                                       Date


                                                                                                             2
   121   122   123   124   125   126   127   128