Page 19 - Policies Procedures Final with cover page
P. 19

•  Minimize unnecessary network traffic that may interfere with others’ ability to make effective use of
                   the organization’s network resources and not overload the organization’s network with excessive,
                   superfluous data

               Further, no user shall reveal or otherwise transmit or distribute sensitive, proprietary or confidential
               business information over the Internet without prior written authorization.
               If an employee abuses the right to use the Internet, they may be subject to corrective action up to and
               including termination, including possible civil and criminal liability.

               Copyright and Licenses

               You may not illegally copy material protected under copyright law or make that material available to
               others for copying.  You are responsible for complying with copyright laws and applicable licenses that
               may apply to software, files, graphics, documents, messages, and other material you wish to download or
               copy.   If you have  any questions about copyright  or licenses, contact a  member of the  Technology
               department or the Human Resources department.
               Users may not install or attach personally owned programs or equipment on Company owned computers
               without first obtaining the permission of IT department.

               Illegal or Destructive Programs

               Users may not develop or use programs such as, but not limited to: music file sharing, viruses, backdoors
               and worms that may disrupt other users, access private or restricted portions of the system, identify
               security vulnerabilities, or damage the software or hardware components of a system.  While we realize
               that some positions use file sharing (Music/Video Programming), you need to ensure that IT Management
               and the Network Administrator are aware of your business requirement.
               File Storage

               It is important to MTR that in the event of a system failure at the PC workstation or a company server that
               all work related files are stored on MTR’s main file servers and backed up on a regular basis.  Employees
               are encouraged to periodically delete files once it is determined that they are no longer needed to keep
               storage requirements to a reasonable level.

               Virtual Private Network (VPN)

               Approved Company employees and authorized third parties (customers, vendors, etc.) may utilize the
               benefits of VPN’s, which are a "user managed" service. This means that the user is responsible for selecting
               an Internet Service Provider (ISP), coordinating installation, installing any required software.

               Remote access is not to be utilized in a way as to work from home on a full time basis unless agreed to by
               management.  It is the responsibility of employees with VPN privileges to ensure that unauthorized users
               are not allowed access to MTR’s internal networks.  Only Company approved VPN clients may be used.
               In conclusion, if an employee abuses MTR’s technology policies, they may be subject to corrective action
               up to and including termination, including possible civil and criminal liability.



                                                             16
   14   15   16   17   18   19   20   21   22   23   24