a)
Employees must respect the confidentiality of other individuals' electronic communications.
Except in cases in which explicit authorization has been granted by company management,
employees are prohibited from engaging in, or attempting to engage in:
Monitoring or intercepting the files or electronic communications of other
employees or third parties;
Hacking or obtaining access to systems or accounts they are not authorized to
use;
Using other people's log-ins or passwords; and
Breaching, testing, or monitoring computer or network security measures.
b)
No email or other electronic communications can be sent that attempt to hide the identity
of the sender or represent the sender as someone else.
c)
Electronic media and services should not be used in a manner that is likely to cause network
congestion or significantly hamper the ability of other people to access and use the system.
d)
Anyone obtaining electronic assess to other companies' or individuals' materials must
respect all copyrights and cannot copy, retrieve, modify or forward copyrighted materials
except as permitted by the copyright owner.
e)
The Company has installed a variety of programs and devices to ensure the safety and security
of the Company's technology resources. Any employee found tampering or disabling any of the
Company's security devices will be subject to discipline up to and including termination.
11.
ENCRYPTION
Employees can use encryption software supplied to them by the systems administrator for purposes of
safeguarding sensitive or confidential business information. Employees who use encryption on files
stored on a company computer must provide their supervisor with a sealed hard copy record (to be
retained in a secure location) of all of the passwords and/or encryption keys necessary to access the
files.
12.
CONFIDENTIAL INFORMATION
The Company is very sensitive to the issue of protection of trade secrets and other confidential and
proprietary information of both the Company and third parties ("Confidential Information"). Therefore,
employees are expected to use good judgment and to adhere to the highest ethical standards when using
or transmitting Confidential Information on the Company's technology resources.
Confidential Information should not be accessed through the Company's technology resources in the
presence of unauthorized individuals. Similarly, Confidential Information should not be left visible or
unattended. Moreover, any Confidential Information transmitted via technology resources should be
marked with the following confidentiality legend:
"This message contains confidential information. Unless you are the addressee (or
authorized to receive for the addressee), you may not copy, use, or distribute this
information. If you have received this message in error, please advice [EMPLOYEE'S