Page 69 - DI Team Member Handbook
P. 69
System Integrity, Security, and Encryption: All systems passwords and encryption keys must be available and known to the organization. You may not install password or encryption programs without the written permission of the operations specialist. Team Members may not use the passwords and encryption keys belonging to others.
Applicable Laws: Numerous state and federal laws apply to electronic communications. The organization complies with applicable laws. Team Members also must comply with applicable laws and should recognize that a Team Member could be personally liable and/or subject to fine and imprisonment for violation of applicable laws.
Consequences of Policy Violations: Violations of this policy may result in disciplinary action up to and including immediate termination of a Team Member's employment as well as possible civil liabilities or criminal prosecution. Where appropriate, the organization may advise legal officials or appropriate third parties of policy violations and cooperate with official investigations. We will not, of course, retaliate against anyone who reports possible policy violations or assists with investigations.
If you have questions about the acceptable use of our systems or the content of electronic communications, ask the operations specialist for advance clarification.
Social Media
“Social media” includes all means of communicating or posting information or content of any sort on the Internet, including to your own or someone else’s web log or blog, journal or diary, personal web site, social networking, or affinity web site, web bulletin board or a chat room,
17
01/2019
4