Page 39 - Handbook DPG 2019-08 VER 2
P. 39
in accordance to DPG’s IT Department standard is as follows; a
minimum of eight characters containing at least one uppercase,
one lower case, one numeric value and one symbol.
Any user on the DPG network who identifies a security problem
must notify DPG Management immediately. Said users must not
demonstrate the problem to other users, non DPG employees,
nor any unauthorized personnel.
7.6 Data Access and Storage
While employed at DPG, you may have access to confidential
information. This information cannot be copied or disclosed
to any other source by any means. Sensitive information
in electronic folders, on media, in document, database,
spreadsheet, electronic mail, and any other format is considered
within the scope of this document.
DPG reserves the right to review, audit, intercept, access, and/or
disclose all data stored on any company’s networks, hardware,
storage, digital, communication, or multimedia devices.
These resources include all DPG networks, networking devices,
personal digital systems, cell phones, phone systems, payroll,
finance systems, and associated computer storage media.
All data on networks or devices mentioned above are the exclusive
and confidential property of DPG. Misuse or conveyance of this
information to unauthorized personnel is not allowed and can
result in immediate termination.
DPG does not condone the use of company property to be
used to save or store any data that may be inappropriate, non-
business related, or data intended for personal use. All data
saved or stored on company property or media owned, rented,
or leased, remains solely the property of DPG.
DPG and companies reserve the right to enforce an effective use
of resources, and will remove any unauthorized, inappropriate,
— 33 —