Acceptable Use Policy Legal Reviewed 10 02 2023

Acceptable Use Policy Legal Reviewed 10 02 2023

Finley Engineering Co., Inc.

Acceptable Use Policy




Effective Date: Oct 04, 2023

Revision History: See End of Document Contact: helpdesk@finleyusa.com


Introduction

This document outlines the acceptable use policy for computers, networks, tablets, cellular phones, servers, software, data storage devices, and other technology assets owned or managed by the company (“Company’s Technology”). All employees, contractors, or other parties who have access to and use Company Technology (“Company Users”) are required to adhere to this policy. Failure to do so may result in disciplinary action, up to and including termination of employment (in the case of employees), contract termination (in the case of contractors), and/or termination of access.

Ownership

Company Technology belongs to Finley Engineering (“Finley” or the “Company”) and any data, files, documents, communications, and/or information created using such technology or stored on such technology also belongs to the Company.

Business Use Policy; Limited Personal Use

All Company Technology are intended for business use. Company Users should not use Company Technology for activities not related to their job functions, except for limited personal use that does not interfere with their work performance or violate other Company policies. All activities using Company Technology should be lawful and align with the values and objectives of the Company. If a Company User uses Company Technology for personal purposes, the Company User has no reasonable expectation of privacy.

Email and Messaging Policy

Email and business messaging applications remain primary tools for business communication. Company Users are expected to use their email and messaging accounts in a responsible and effective manner. Please note that all email and messaging records are considered Company records and are subject to monitoring. Company Users should have no expectation of privacy for any activities conducted on the Company’s email or messaging systems. The use of email or messaging applications to transmit sensitive or confidential information should only occur over secure channels and must comply with Company policies on data protection.

Internet and Web Applications

Internet access is provided to Company Users to facilitate their job performance. Use of the internet should remain professional, ethical, and aligned with the Company's objectives. Unauthorized downloading of software, videos, or voice files is is prohibited. All internet activities should comply with the Company's data and network security policies, as well as the Company’s policies against harassment, discrimination, and unprofessional behavior.

Software Usage Policy

Company Users should only use software that has been officially approved and licensed by the Company. Unauthorized installation or copying of software is strictly prohibited and may result in disciplinary action.

Security Policy

All Company Users are responsible for maintaining the security of Company Technology. This includes adhering to password policies, securing physical assets, and reporting any suspected security incidents to the IT Department.

Privacy and Monitoring

Although Company Users may use log-on identifications, passwords, encryption, and user-specific mailboxes, these passwords and other security devices are for the protection of the Company, not the user. Company Users do not have a reasonable expectation that information sent, received, created, edited, downloaded, or stored (temporarily or permanently) using Company Technology is private or confidential. The Company reserves the right to monitor any such information. Any information a Company User wishes to remain private should not be downloaded, accessed, transmitted, displayed or stored on Company Technology.

In short, Company Users have no expectation of privacy when using Company Technology. The Company reserves the right to monitor usage to ensure compliance with this and other policies. All monitoring will be conducted in accordance with applicable laws and regulations.


Prohibited Uses of Company Technology

Prohibited uses of Company Technology include but are not limited to: accessing (viewing or downloading) sexually oriented materials or content; accessing material that is in violation of any other Company policy, including policies against harassment and discrimination; violating software copyrights and licenses by loading or giving out unlicensed software applications; computer or internet-based gambling; using Company Technology with the intent or purpose of violating local, state or federal laws; downloading and/or installing any application that has not been authorized by the Company (including personal applications such as games); and modifying the hardware configuration (adding or removing peripherals) in any way, except as authorized by the Company.

Non-Compliance

Company Users must notify their supervisor upon learning of any violations of this policy.

Failure to comply with this Acceptable Use Policy may lead to disciplinary action, up to and including termination of employment, contract termination, or termination of access. Severe violations may also result in legal action.


Termination of Employment

Upon termination of employment, a Company User must promptly cease using all Company Technology and return all such technology and all information, files, communications, and documents on such technology, to the Company.

Guidelines for Acceptable and Unacceptable Practices

Acceptable Practices


  Email Conduct: Use Company-provided email for professional correspondence only. Ensure that your communication is professional, respectful, and adheres to Company standards.

  Internet Usage: Limit browsing to websites that are directly related to your work responsibilities.

  Data Protection: Use Company-approved data storage solutions for work-related files and documents.

  Software: Only use software that has been licensed and approved by the Company's IT Department.

  Remote Work: If working remotely, use VPN or other secure methods to access the Company network.

  Social Media: If engaging in work-related social media activity, ensure that the content aligns with the Company's values and policies.

  Device Care: Maintain all Company-provided devices in good working condition. Report any malfunctions to the IT Department promptly.



Unacceptable Practices


  In addition to any other prohibitions contained elsewhere in this Policy, Company Technology may not be used for any illegal, unlawful, unethical, destructive, wasteful, or otherwise inappropriate purposes.

  Email Misuse: Using Company email for personal activities, chain mails, or transmitting spam.

  Unauthorized Downloads: Downloading software, games, or media files that are not approved for business use.

  Sensitive Information: Sharing or transmitting sensitive or confidential Company information without proper authorization

  Passwords: Sharing passwords with other Company Users. Keep your password confidential and do not share it, except as needed with Company IT.

  Bypassing Security Measures: Attempting to disable, defeat, or bypass Company security measures, firewalls, or antivirus software.

  Illegal Activity: Using company assets to engage in activities that are illegal or unethical.

  Impersonation: Using someone else’s login credentials or impersonating another user.

  Personal Use: Excessive personal use of the internet, including but not limited to, social media, video streaming, and gaming.


Security Guidelines


Password Security:

Choose strong passwords that contain a mix of letters, numbers, and special characters. Do not share passwords with anyone, except as directed by authorized personnel.

Update passwords regularly, in accordance with Company policy.


Multi-Factor Authentication (MFA):

Enable MFA on all accounts that support it, particularly for accessing sensitive or critical systems.


Firewall and Antivirus:

Ensure that firewalls and antivirus software are enabled and updated on all devices.


Software Updates:

Keep all software and systems up-to-date. Apply patches as directed by the IT Department.

Secure Data Transmission:


Always use secure and approved methods for transmitting sensitive data, both internally and externally.


Phishing Awareness:

Be cautious of suspicious emails and links. Report any suspected phishing attempts to the IT Department.


Remote Work Security:

Secure your home network (e.g. strong Wi-Fi password, create a guest network) when working remotely.

Use Company-approved remote desktop solutions for accessing company systems.


Physical Security:

Never leave Company Technology unattended in an unsecure location. Report lost or stolen Company Technology immediately.




Revision History


  1. Version 1.0 Jan 15, 2016
  2. Version 2.0 Oct 04, 2023








4876-9623-6932, v. 1


    • Related Articles

    • Release Email Quarantine & Add Inbound Mail Exception to Anti-Spam policy

      If a user needs emails released from quarantine and wants to confirm that emails from that domain or sender are not quarantined in the future, the emails will need to be released and then an exception will need to be added to the inbound mail policy ...
    • Teams Training

      Within this knowledge base article are links that will provide training on various aspects of the Microsoft Teams application that we use daily at Finley. Click on the links below to be redirected to step-by-step guides imbedded with videos. Getting ...
    • Outlook Training

      This knowledge base article contains links that will provide training on various aspects of the Microsoft Outlook application that we use daily at Finley. Click on the topics below to be redirected to step-by-step guides imbedded with videos that ...
    • OneDrive Training

      This knowledge base article contains links that will provide training on various aspects of the Microsoft OneDrive application that we use daily at Finley. Click on the topics below to be redirected to step-by-step guides imbedded with videos that ...
    • iPad Guide

      Welcome to your iPad Basic Training Guide! This guide will help you get started with your device, covering essential functions and features to make your experience smooth. Getting Started: Power On/Off: To power on your iPad, press and hold the top ...