Page 19 - Policies Procedures Final with cover page
P. 19
• Minimize unnecessary network traffic that may interfere with others’ ability to make effective use of
the organization’s network resources and not overload the organization’s network with excessive,
superfluous data
Further, no user shall reveal or otherwise transmit or distribute sensitive, proprietary or confidential
business information over the Internet without prior written authorization.
If an employee abuses the right to use the Internet, they may be subject to corrective action up to and
including termination, including possible civil and criminal liability.
Copyright and Licenses
You may not illegally copy material protected under copyright law or make that material available to
others for copying. You are responsible for complying with copyright laws and applicable licenses that
may apply to software, files, graphics, documents, messages, and other material you wish to download or
copy. If you have any questions about copyright or licenses, contact a member of the Technology
department or the Human Resources department.
Users may not install or attach personally owned programs or equipment on Company owned computers
without first obtaining the permission of IT department.
Illegal or Destructive Programs
Users may not develop or use programs such as, but not limited to: music file sharing, viruses, backdoors
and worms that may disrupt other users, access private or restricted portions of the system, identify
security vulnerabilities, or damage the software or hardware components of a system. While we realize
that some positions use file sharing (Music/Video Programming), you need to ensure that IT Management
and the Network Administrator are aware of your business requirement.
File Storage
It is important to MTR that in the event of a system failure at the PC workstation or a company server that
all work related files are stored on MTR’s main file servers and backed up on a regular basis. Employees
are encouraged to periodically delete files once it is determined that they are no longer needed to keep
storage requirements to a reasonable level.
Virtual Private Network (VPN)
Approved Company employees and authorized third parties (customers, vendors, etc.) may utilize the
benefits of VPN’s, which are a "user managed" service. This means that the user is responsible for selecting
an Internet Service Provider (ISP), coordinating installation, installing any required software.
Remote access is not to be utilized in a way as to work from home on a full time basis unless agreed to by
management. It is the responsibility of employees with VPN privileges to ensure that unauthorized users
are not allowed access to MTR’s internal networks. Only Company approved VPN clients may be used.
In conclusion, if an employee abuses MTR’s technology policies, they may be subject to corrective action
up to and including termination, including possible civil and criminal liability.
16