SPC Software Systems
SPC Software Systems Acceptable Use
You are responsible for exercising
good judgment regarding appropriate use of resources in accordance with SPC
Software Systems policies, standards, and guidelines. For security, compliance, and maintenance purposes, authorized
personnel may monitor and audit equipment, systems, and network traffic per the
Audit Policy. Devices that interfere with other devices or users on the SPC
Software Systems network may be disconnected.
Acceptance: By signing this agreement, I
agree to always act in a manner that is respectful to others and myself in a
way that will represent SPC Software Systems in a positive way. I understand
and acknowledge that violation of this policy will lead to appropriate
sanctions being carried out and may be subject to disciplinary action, up to and
including termination of employment. A violation of this policy by a temporary worker,
contractor or vendor may result in the termination of their contract or
assignment with SPC Software Systems.
Name (Printed) _______________________________
Signature: __________________________ Date: ________________
Representative: __________________________________ Date: __________________
Acceptable Use of
SPC Software Systems Policy
responsible for the security of data, accounts, and systems under your control.
Providing access to another individual, either deliberately or through failure
to secure its access, is a violation of this policy.
secure and do not share account or password information with anyone, including
other personnel, family, or friends.
Software Systems business that results in the storage of proprietary
information on personal devices maintained by a third party with whom SPC
Software Systems does not have a contractual agreement, is prohibited.
The use of an
e-mail account that is not provided by SPC Software Systems and its partners for
company business is extremely prohibited
responsible for ensuring the protection of assigned SPC Software Systems assets
that includes the use of conference rooms and shares devices. Laptops left
portable devices and workstations must be password-protected and you must lock
the screen or log off when the device is unattended.
connect to the SPC Software Systems network must comply with the Minimum Access
Do not interfere
with corporate device management or security system software, including, but
not limited to, antivirus and VPN access.
responsible for the security and appropriate use of network resources under
your control. Using SPC Software Systems resources for the following is
copyright law, including, but not limited to, using computers to perpetrate any
form of fraud, and/or software, film or music piracy
Sharing confidential material, trade secrets,
or proprietary information outside of the organization
introducing malicious code, including, but not limited to, viruses, worms, Trojan
horses, e-mail bombs, spyware, adware, and key loggers.
Port scanning or
security scanning on a production network unless authorized in advance by
following are strictly prohibited:
posting discriminatory, harassing, or threatening messages or images on the
Internet or via SPC Software Systems email service
Sending Spam via
e-mail, text messages, pages, instant messages, voice mail, or other forms of
misrepresenting, obscuring, suppressing, or replacing a user identity on any
electronic communication to mislead the recipient about the sender.
Posting the same
or similar non-business-related messages to large numbers such as Usenet
newsgroups (newsgroup spam).
posting chain letters, solicitations, or advertisements not related to business
purposes or activities
In the event of
a loss or theft of assigned laptop and cell phone, contact you manager and the
Help Desk immediately.
In the event of
a malware or virus attack, disconnect your device from the Network, report to
your manager and hand in your device to the Help Desk team immediately.