Page 25 - Handbook DPG 2019-08
P. 25
Relation to Other Policies
This policy is intended to be consistent with other DPG policies, including the Company’s
sexual Harassment and Equal Opportunity policies. Employees are to use DPG’s electronic
mail and Internet systems in a manner that is consistent with these other policies.
7.5 Networks System Login, Username, and Password
By logging in to any DPG network, system, or device you agree to the following:
Only DPG authorized employees may login to any DPG networks, systems or device(s).
Unauthorized DPG employees or non DPG employees must request permission from DPG
Management prior to login. Unauthorized use or installation of any software or hardware that
is not approved by DPG Management is prohibited.
Absolutely no computer, system, or electronic device not owned and/or approved by DPG
Management may be used at any time. All DPG networks, systems, and electronic devices
can and will be monitored. Any and all illegal, immoral, unethical, or otherwise inappropriate
activities will be reported.
As a user of the DPG network, all users will be assigned a user name and password by DPG
Management. This user name is for his or her sole use within the scope of the DPG network
and its applications. Said user accepts full responsibility for any activity that occurs under this
login identification. Each user also has defined limitations for access to electronic media
information contained within the DPG network.
Any attempts to log into the DPG networks as a system administrator or another user without
the explicit consent of DPG Management will result in immediate revocation of user’s rights and
privileges on said network. Any user identified as a security risk, or failure to adhere to DPG
Information Technology policies & procedures will be denied access as deemed necessary.
DPG Information Technology password policy regulations control the complexity and lifetime of
passwords. A password in accordance to DPG's IT Department standard is as follows; a minimum
of eight characters containing at least one uppercase, one lower case, one numeric value and
one symbol.
Any user on the DPG network who identifies a security problem must notify DPG Management
immediately. Said users must not demonstrate the problem to other users, non DPG
employees, nor any unauthorized personnel.
7.6 Data Access and Storage
While employed at DPG, you may have access to confidential information. This information
cannot be copied or disclosed to any other source by any means. Sensitive information in
electronic folders, on media, in document, database, spreadsheet, electronic mail, and any
other format is considered within the scope of this document.
20
20