Page 26 - Handbook DPG 2019-08
P. 26

DPG reserves the right to review, audit, intercept, access, and/or disclose all data stored on
       any company’s networks, hardware, storage, digital, communication, or multimedia devices.
       These resources include all DPG networks, networking devices, personal digital systems, cell
       phones, phone systems, payroll, finance systems, and associated computer storage media.

       All data on networks or devices mentioned above are the exclusive and confidential property of
       DPG. Misuse or conveyance of this information to unauthorized personnel is not allowed and
       can result in immediate termination.

       DPG does not condone the use of company property to be used to save or store any data
       that may be inappropriate, non-business related, or data intended for personal use. All data
       saved or stored on company property or media owned, rented, or leased, remains solely the
       property of DPG.

       DPG and companies reserve the right to enforce an effective use of resources, and will remove
       any unauthorized, inappropriate, non-business related, or personal data, immediately and
       without warning. Personal data should not be kept on any company equipment or devices.

       7.7  Monitored Use Policy

       You are accessing an information system that is provided for authorized use only.

       DPG routinely monitors communications occurring on this information system, and any
       device attached to this information system, for purposes including, but not limited to,
       penetration testing, communications security (COMSEC) monitoring, network defense, quality
       control, employee misconduct investigations, law enforcement investigations, and
       counterintelligence investigations.

       At any time, DPG may inspect and/or seize data stored on this information system and any
       device attached to this information system.

       Communications occurring on or data stored on this information system, or any device attached
       to this information system, are not private. They are subject to routine monitoring and search.

       Any communications occurring on or data stored on this information system, or any device
       attached to this information system, may be disclosed or used for any DPG-authorized
       purpose.

       Security protections may be utilized on this information system to protect certain interests that
       are important to the company. For example, passwords, access cards, encryption or biometric
       access controls provide security for the benefit of the company. These protections are not
       provided for your benefit or privacy and may be modified or eliminated at the company’s
       discretion.
                             21

                             21
   21   22   23   24   25   26   27   28