Acceptable Use Policy - White Spot Hospitality

advertisement
Acceptable Use Policy
White Spot Limited
Revised February 2012
This document serves to complement the governing Privacy Policy and Personal & Business Conduct
Policy and applies to all employees and contractors of White Spot Limited who are authorized to use
White Spot Limited’s Systems. The purpose of this policy is to ensure the efficient use of Company
resources and to protect the Company and its employees from misuse of those resources.
This Acceptable Use Policy (AUP) governs the use of White Spot Limited’s Systems (hardware, software,
bandwidth, electronic media, service applications & general network infrastructure). By using the
Systems, you acknowledge that you have read, understand and agree to this Acceptable Use Policy as
set out in this document.
This document may be revised from time to time and it is your responsibility to ensure that you comply
with the latest edition of the AUP at any given time. The latest version of this document can be found
at www.whitespotonline.com.
If you have any questions regarding the proper use White Spot Limited’s Systems please do not hesitate
to contact the Systems Department.
All violations of these guidelines must be reported to the White Spot Systems Department.
Failure to follow the guidelines set out in this document will result in disciplinary action, which could
include termination of employment with White Spot Limited.
I fully understand and agree to follow the guidelines listed above.
Print Name:
Signature:
White Spot Limited (WSL) provides a variety of Systems for the use of our employees. The guidelines
are put in place to ensure professionalism & efficiency is maintained in the use of our organizational
tools, network security is maintained, and PCI compliance is assured.
Network Access Accounts
Network Access Accounts allow users to logon to WSL Systems, including (but not limited to) the
electronic mail system, network file storage, proprietary software systems and online resources (e.g.
intranet, ftp site). If someone were to gain access to a user’s account password, they could tamper with
that user’s files and email.






Login names and passwords must be kept secret and not be communicated to any third party. If
passwords are written down they must be stored securely and accessed by authorized users
only.
Users should change passwords regularly and avoid easily guessed passwords.
White Spot’s Systems Department must be notified immediately upon termination of
employees in a user’s employ or upon compromised accounts.
Accounts are to be used only by the authorized owner of the account for the authorized
purpose. Users may not share their account number or password with another person or leave
an open file or session unattended or unsupervised. Account owners are ultimately responsible
for all activity under their account.
Users must not access anyone’s computer, software or data, without the knowledge and
consent of that person. This includes, but is not limited to, accessing data not intended for the
users, or logging into or making use of a server or account a user is not expressly authorized to
access.
Use or distribution of tools designed for compromising security, such as password guessing
programs, cracking tools, packet sniffers or network probing tools is strictly prohibited.
Bandwidth
Bandwidth encompasses all network technologies that allow for the transmission of information from
one location to another. These technologies include, but are not limited to, provisioned ISP’s (e.g. DSL,
Cable), virtual private networks, and wireless access points.





Bandwidth provisioned must be used exclusively for the direct benefit to the productivity of the
Company. Users are prohibited from non-business activities that generate heavy network traffic
(e.g. streaming music/video, bit-torrent downloads, file sharing) as they may incur financial cost
and/or interfere with others’ legitimate use of the Services.
Diligent effort must be made to conserve system resources.
White Spot has the right to monitor transmissions across the WSL network and to disclose the
same in accordance with the governing Privacy Policy.
Users may not run any program that monitors or intercepts network packet data or any program
that compromises the privacy of network traffic.
Associating any device to network access points utilizing the provisioned bandwidth, including
wireless, is prohibited.
Email
Email is a Company supplied resource and is intended for business use only. White Spot Limited owns
and asserts copyright over all materials created by its employees as part of their employment including
that sent through the email system; therefore, users of the White Spot’s electronic mail system must not
assume privacy or confidentiality. The Company does not intend to routinely monitor the contents of
these systems. However, users should expect that if questions arise regarding appropriate use of these
tools, they will be investigated fully.
Appropriateness of Use
Users are responsible for the appropriateness and content of material they transmit or publish on the
system. Users must not:





Use abusive, threatening, or otherwise objectionable language in either public or private
messages
Join non-business related mailing lists
Falsify information or originator by means or use of another user’s accounts or passwords
Users may not "spam" people via email. This is defined as unsolicited (unwanted,
unrequested) email and includes 'virus alerts' that have not been authenticated or 'get rich
quick' chain mails. If in doubt and especially if the message urges to 'pass it on', don't.
Subscribe to mailing lists, bulletin boards, chat groups and commercial on-line services.
Personal email accounts should be used for this purpose.
Legal & Regulatory Compliance
Users of the electronic mail system are responsible for any misuse that originate from the user’s
individual email account, even activities committed by any friend, family, co-worker, employee, guest or
anyone with access to the account. Users must ensure that others not gain unauthorized access.



Email is neither private nor secret. Personal emails can easily be forwarded to other parties
to whom they were not originally intended and the message manipulated or misconstrued.
This can result in liability of the sender for issues arising such as harassment, defamation or
discrimination. Emails are discoverable documents that may be required to be produced for
legal proceedings.
Communications may not be encrypted so as to avoid security review.
Use of the Services for any activity that violates Local, Provincial, Federal or International
law, order or regulation, is a violation of this Agreement. Prohibited activities include, but
are not limited to:
- Posting, storing, transmitting or disseminating unlawful material, including without
limitation, child or other pornography, any content, data or other material which is
libellous, obscene, hateful, unlawful, threatening, reaction or ethnically offensive,
defamatory or which in any way constitute or encourages conduct that would constitute
a criminal offense.
- Disseminating material which violates copyright or intellectual property rights.
- Fraudulent activities; including but not limited to: impersonating any person or entity, or
forging anyone’s digital or manual signature.
Business Continuity
It is the user’s responsibility to make every effort to conserve system resources and ensure that his/her
activities do not interfere with the legitimate use of the electronic mail system for others.


WSL reserves the right to limits the number of email messages that users can send, the size of
those messages and the amount of email storage allotted per individual email user.
White Spot is not responsible for the forwarding of email sent to any account which has been
suspended or terminated. Such email will be returned to sender, ignored, deleted, or stored
temporarily, at WSL’s sole discretion.
Mobile Devices
We understand how critical the convenience of email on the go is but this connectivity also comes with
responsibility to protect company information. This section applies to personal or business owned
mobile devices (e.g. phones & tablets.) If you opt to configure your device to receive and send
company specific electronic mail, calendar, and contact updates via mail.whitespot.ca synchronization
through Microsoft Exchange ActiveSync you are bound to the following conditions.
Passcode Required
You will need to set up a passcode that will need to be entered to unlock your device in order to
prevent unauthorized users from accessing information on the device.
Automatic Lock
After 5 minutes your device will automatically lock and a passcode will be required to unlock
your device (see above.)
Remote Wipe
White Spot Limited has the right to remotely erase all data on your device and reset it to factory
default.
Automatic Wipe after 10 Incorrect Passcode Attempts
Your device will be erased of all data and reset to factory default if an incorrect passcode is
entered 10 times consecutively.
Data Storage
Data storage is a Company supplied resource and is intended for business use only. White Spot Limited
owns and asserts copyright over all materials stored and users must not assume privacy or
confidentiality. The Company does not intend to routinely monitor the contents of network storage.
However, users should expect that if questions arise regarding appropriateness, they will be investigated
fully.


Users shall not seek information on, obtain copies of, or modify files or other data belonging to
other users, or attempt to gain unauthorized access to the system.
Users will not store unlawful information on networks and systems (e.g. screensavers, graphic &
music files)




Operating or requesting others to operate any company equipment for personal business, or
other non-work related reasons.
Make unauthorized use of any information in files maintained, stored, or processed by WSL, or
permit anyone else to make unauthorized use of such information.
Make excessive use of resources such as network file storage, leading to a denial of service to
others, especially when compounded by not responding to requests for action
Diligent effort must be made to conserve system resources.
Hardware
Hardware includes (but is not limited to), PCs, laptops, modems, printers, network servers, cabling and
firewalls. At any given time, White Spot Systems Department must provided physical and/or remote
access any hardware owned by WSL.




Using hardware for any use other than the productivity of the management and or staff is
prohibited.
Any attempt to breach the security of any machine is forbidden.
Users agree not to relocate any equipment or perform any hardware maintenance or upgrades
as they could negate warranties in place. Maintenance to WSL owned hardware must be done
by a technician approved by the White Spot Systems Department.
Users must not connect any unauthorised hardware devices to the System (e.g. wireless
modem, external drives)
Software
Software owned/licensed by WSL is to be used for business purposes exclusively.




Users must not install or store any unauthorized software on WSL Systems. Any unauthorized
software will be deleted without notification or recompense.
Users must not duplicate any WSL owned/licensed software
Users agree to comply with the applicable terms and conditions of all end user license
agreements agreed to by WSL
User must not, by their actions or inactions, aid the distribution of computer viruses, malware or
other malicious software
PCI (Payment Card Industry) Compliance
WSL has a responsibility to safeguard the credit card and banking information it uses for the purposes of
conducting business transactions.




PAN (Primary Account Number) detail must not be sent via electronic mail
PAN (Primary Account Number) detail must not be stored on WSL data storage
PAN (Primary Account Number) detail must be masked on all banking slips
PAN (Primary Account Number) information recorded for the purpose of future transactions
must be secured and access limited to appropriate individuals




Banking cards left onsite by guests must be secured
Firewall configurations must meet WSL standards
Access to banking point of sale equipment must be limited to staff assigned to conduct the
business transactions
All banking terminals must have a properly applied security sticker and risk management
procedures followed
Information Security and Confidentiality
Many staff members handle a variety of proprietary and private company information, and others
associated with the company, as well as confidential information regarding company business. This
material may include but is not limited to, payroll figures, personal data (such as personal employee
information), confidential files, or financial information. The security and confidentiality of this
information is critical.


Disclosure and discussion of confidential information obtained from departmental records,
either during or after employment with the Company, is strictly prohibited unless such
disclosure is a normal requirement of an employee’s position or has been so authorized.
Your are responsible for the security of any portable device holding Company information (e.g.
CDs, memory keys, PDA’s, phones, laptops)
Download