+32468072112
info@nexly.eu
0
Page cover
Nexly IT Acceptable Use Policy

IT Acceptable Use Policy

Rules for using company IT resources

Nexly Corporation - IT Acceptable Use Policy

1. Introduction & Purpose

This IT Acceptable Use Policy (the "Policy") outlines the acceptable use of Nexly Corporation's ("Nexly" or the "Company") information technology (IT) resources, including, but not limited to, computers, networks, internet access, email, software, hardware, and data (collectively, "IT Resources"). Located at 701 South Street Suite 100, Mountain Home, AR 72653, Nexly provides these IT Resources to its employees, contractors, and other authorized users (collectively, "Users") to support business operations. This Policy is designed to:

  • Protect Company Data and Systems: Ensure the security and integrity of Company data and systems.
  • Promote Responsible Use: Promote the responsible and ethical use of IT Resources.
  • Prevent Unauthorized Access and Use: Prevent unauthorized access to and use of Company IT Resources.
  • Ensure Legal and Regulatory Compliance: Ensure compliance with all applicable laws, regulations, and industry standards.
  • Protect Intellectual Property: Protect the Company's intellectual property rights and the intellectual property of others.
  • Maintain Productivity: Ensure that IT Resources are used efficiently and effectively.
  • Define User Responsibilities: Establish clear rules of conduct.

This Policy applies to all Users of Nexly's IT Resources, regardless of their location or device. This Policy is to be read in conjunction with other Company policies, including, but not limited to, the Information Security Policy, the Data Privacy Policy, the Confidentiality and Non-Disclosure Policy, the Mobile Device & BYOD Policy, and the Code of Conduct.

2. General Guidelines for Acceptable Use

All Users of Nexly Corporation's IT Resources must adhere to the following general guidelines:

  • 2.1. Authorized Use: IT Resources should be used primarily for business purposes. Limited personal use is permitted, provided that it does not violate this Policy or any other Company policies and does not interfere with business operations.
  • 2.2. Security: Users must protect the security of Company IT Resources.
    • Password Security: Comply with the Password & Authentication Policy [Link to Password & Authentication Policy].
    • Protect Devices: Protect Company-owned devices.
    • Report Security Issues: Report any suspected security vulnerabilities or incidents to the IT Department immediately.
  • 2.3. Data Protection: Users must protect Company data.
    • Data Handling: Comply with the Company's Data Privacy Policy [Link to Data Privacy Policy] and handle data appropriately.
    • Confidentiality: Protect confidential information and trade secrets. Follow the Confidentiality & Non-Disclosure Policy [Link to Confidentiality Policy].
    • No Unauthorized Access: Do not attempt to access any data, systems, or files that you are not authorized to access.
  • 2.4. Respectful and Professional Conduct:
    • Professional Behavior: Use IT Resources in a professional and respectful manner.
    • Harassment Prohibition: Do not use IT Resources to engage in harassment, discrimination, or any other form of unlawful behavior.
    • Copyright: Respect intellectual property rights.
  • 2.5. Compliance with Laws and Regulations:
    • Legal Compliance: Comply with all applicable laws and regulations when using IT Resources.
    • Compliance with Company Policies: Comply with all Company policies.
  • 2.6. Monitoring: Nexly reserves the right to monitor the use of its IT Resources to ensure compliance with this Policy and to protect its interests. [Include a notice about monitoring].
  • 2.7. User Agreement:
    • All users must accept the terms of this Policy.

3. Prohibited Activities

The following activities are strictly prohibited when using Nexly Corporation's IT Resources:

  • 3.1. Unauthorized Access: Attempting to gain unauthorized access to any Company systems, data, or networks.
  • 3.2. Malicious Activities: Engaging in malicious activities, such as:
    • Malware Distribution: Distributing malware, viruses, worms, or other malicious software.
    • Phishing: Engaging in phishing or other fraudulent activities.
    • Denial of Service: Launching denial-of-service (DoS) attacks.
  • 3.3. Data Breach: Attempting or causing a data breach.
  • 3.4. Interference with Systems: Interfering with the operation of Company systems or networks.
  • 3.5. Unauthorized Use of Software: Installing or using software without proper authorization, including unlicensed software.
  • 3.6. Illegal Activities: Using IT Resources for any illegal activities, such as illegal downloading, distribution of illegal content, or engaging in any other unlawful behavior.
  • 3.7. Unacceptable Content: Creating, storing, transmitting, or accessing content that is:
    • Offensive: Obscene, defamatory, or offensive.
    • Discriminatory: Discriminatory or harassing.
    • Pornographic: Pornographic.
  • 3.8. Excessive Use: Engaging in excessive personal use of IT Resources that interferes with business operations.
  • 3.9. Circumventing Security Measures: Attempting to bypass or circumvent any security measures, including firewalls, intrusion detection systems, and access controls.
  • 3.10. Unauthorized Disclosure: Disclosing Company confidential information.
  • 3.11. Mining, Cryptocurrency Creation, or Related Activities: Use of Company IT assets for mining, cryptocurrency, or any other related activity.
  • 3.12. Compromising or attempting to compromise the integrity of data or systems.
  • 3.13. Misuse of Resources: Overloading systems, or in any way, preventing normal use of computing resources.
  • 3.14. Installing non-approved software on company devices.

4. Email & Messaging

The following guidelines apply to the use of Company email and messaging systems:

  • 4.1. Professionalism: Use professional language in all emails and messages.
  • 4.2. Purpose: Use email and messaging systems primarily for business-related communication.
  • 4.3. Security: Exercise caution when opening email attachments or clicking on links. Report any suspicious emails to the IT Department.
  • 4.4. Confidentiality: Protect the confidentiality of all communications.
  • 4.5. Compliance: Follow the Company's email archiving and retention policies.
  • 4.6. Avoiding Spam: Avoid sending unsolicited emails.

5. Internet Access & Social Media

The following guidelines apply to the use of the Internet and social media:

  • 5.1. Internet Usage:
    • Acceptable Uses: Use the internet for legitimate business purposes. Limited personal use is allowed.
    • Prohibited Uses: Do not access websites that contain illegal, offensive, or inappropriate content.
    • Protect the Company: Follow all security and privacy guidelines.
  • 5.2. Social Media:
    • Compliance with Policy: Follow the Company's Social Media and Online Communication Policy. [Link to Social Media Policy].
    • Identify Yourself: When posting content related to Nexly, be sure to clearly identify yourself as an employee.
    • Approved Accounts: Use only company-approved social media accounts.

6. Policy Enforcement & Consequences of Non-Compliance

Nexly Corporation will enforce this Policy and take appropriate action to address any violations.

  • 6.1. Monitoring: The Company may monitor the use of IT Resources to ensure compliance with this Policy.
  • 6.2. Reporting Violations: Any suspected violations of this Policy should be reported immediately to the IT Department or [Specify other Reporting Channels, e.g., your supervisor or HR].
  • 6.3. Disciplinary Action: Failure to comply with this Policy may result in disciplinary action, up to and including termination of employment or contract.
    • Severity: The severity of the disciplinary action will depend on the nature and severity of the violation.
    • Legal Action: Nexly Corporation reserves the right to pursue all available legal remedies.

7. Policy Review & Amendments

This IT Acceptable Use Policy will be reviewed and updated regularly to ensure its continued effectiveness.

  • Review Frequency: This Policy will be reviewed at least [Specify Frequency, e.g., annually] or more frequently as needed, such as in response to changes in the technology landscape, the Company's business operations, or the regulatory environment.
  • Review Process: The review process will involve:
    • Input from Stakeholders: Seeking input from relevant stakeholders, including the IT Department, Legal Counsel, and other key personnel.
    • Best Practices Review: Reviewing industry best practices.
    • Legal Compliance: Ensuring compliance with all applicable laws and regulations.
  • Policy Amendments and Communication: Any amendments to this Policy will be approved by [Specify Approving Authority, e.g., the Board of Directors or the Executive Leadership Team] and communicated to all users through [Specify Communication Channels, e.g., company-wide email, intranet posting, training sessions].
  • Policy Ownership: The Information Technology Department is responsible for maintaining and updating this Policy.

**Acknowledgement:** By using Nexly Corporation's IT Resources, all users are deemed to acknowledge that they have read, understood, and agree to abide by the terms and conditions outlined in this IT Acceptable Use Policy.

- Nexly
+32468072112
info@nexly.eu
0
Favorites 0
Compare 0