Page 25 - Handbook DPG 2019-08
P. 25

Relation to Other Policies
       This policy is intended to be consistent with other DPG policies, including the Company’s
       sexual Harassment and Equal Opportunity policies. Employees are to use DPG’s electronic
       mail and Internet systems in a manner that is consistent with these other policies.

       7.5 Networks System Login, Username, and Password

       By logging in to any DPG network, system, or device you agree to the following:

       Only DPG authorized employees may login to any DPG networks, systems or device(s).
       Unauthorized DPG employees or non DPG employees must request permission from DPG
       Management prior to login. Unauthorized use or installation of any software or hardware that
       is not approved by DPG Management is prohibited.

       Absolutely no computer, system, or electronic device not owned and/or approved by DPG
       Management may be used at any time. All DPG networks, systems, and electronic devices
       can and will be monitored. Any and all illegal, immoral, unethical, or otherwise inappropriate
       activities will be reported.

       As a user of the DPG network, all users will be assigned a user name and password by DPG
       Management. This user name is for his or her sole use within the scope of the DPG network
       and its applications. Said user accepts full responsibility for any activity that occurs under this
       login identification. Each user also has defined limitations for access to electronic media
       information contained within the DPG network.

       Any attempts to log into the DPG networks as a system administrator or another user without
       the explicit consent of DPG Management will result in immediate revocation of user’s rights and
       privileges on said network. Any user identified as a security risk, or failure to adhere to DPG
       Information Technology policies & procedures will be denied access as deemed necessary.

       DPG Information Technology password policy regulations control the complexity and lifetime of
       passwords. A password in accordance to DPG's IT Department standard is as follows; a minimum
       of eight characters containing at least one uppercase, one lower case, one numeric value and
       one symbol.

       Any user on the DPG network who identifies a security problem must notify DPG Management
       immediately. Said users must not demonstrate the problem to other users, non DPG
       employees, nor any unauthorized personnel.

       7.6 Data Access and Storage

       While employed at DPG, you may have access to confidential information. This information
       cannot be copied or disclosed to any other source by any means. Sensitive information in
       electronic folders, on media, in document, database, spreadsheet, electronic mail, and any
       other format is considered within the scope of this document.
                             20
                             20
   20   21   22   23   24   25   26   27   28