Viad Corp Technology Use Policy

Viad Corp
Technology Use Policy
Technology Use Policy
1. PURPOSE .................................................................................................................. 3
Definitions .................................................................................................................. 3
2. USE OF TECHNOLOGY ............................................................................................ 5
No Expectation of Privacy. ......................................................................................... 5
Waiver of Privacy Rights ............................................................................................ 5
Intended Use. ............................................................................................................ 5
Personal Use. ............................................................................................................ 5
Ownership .................................................................................................................. 5
Duty to Report Inappropriate or Prohibited Uses of Company Technology and
Electronic Communications. ................................................................................. 6
3. USING TECHNOLOGY FOR ELECTRONIC COMMUNICATIONS .......................... 6
Electronic Communications ....................................................................................... 6
The Internet ............................................................................................................... 7
Social Media and Blogging Activities. ........................................................................ 7
Instant Messaging. ..................................................................................................... 9
Text Messaging.......................................................................................................... 9
Other Methods of Electronic Communication. .......................................................... 10
4. RETENTION OF ELECTRONIC COMMUNICATIONS ............................................ 10
E-Mail Retention. ..................................................................................................... 10
Retention of E-Mail Attachments and Electronic Documents. .................................. 11
Retention of Other Forms of Electronic Communication .......................................... 11
Retention in the Event of Dispute, Litigation, Subpoena, or Inquiry. ........................ 11
Back-Up. .................................................................................................................. 11
5. APPROPRIATE AND INAPPROPRIATE USES OF TECHNOLOGY ..................... 11
Appropriate Uses ..................................................................................................... 11
Inappropriate Uses................................................................................................... 11
6. SPECIAL RULES FOR CONFIDENTIAL INFORMATION IN ELECTRONIC
COMMUNICATIONS ............................................................................................... 12
Definition of Confidential Information, Sensitive Confidential Information and Material
Non-Public Information ....................................................................................... 12
Use of Confidential Information. ............................................................................... 12
7. SECURITY AND PROTECTION OF CUSTOMER’S PAYMENT CARD
INFORMATION........................................................................................................ 13
8. SECURITY AND PROTECTION OF PERSONALLY IDENTIFIABLE
INFORMATION........................................................................................................ 13
Revised
11/21/13
Technology Use Policy
9. USE OF NON-COMPANY OWNED TECHNOLOGY DEVICES .............................. 13
10. USER IDS AND PASSWORDS .............................................................................. 14
11. VIRUSES ................................................................................................................ 14
Virus Detection......................................................................................................... 14
E-Mail Attachments .................................................................................................. 14
12. VIOLATIONS AND REPORTING VIOLATIONS..................................................... 15
Violations ................................................................................................................. 15
Reporting Violations. ................................................................................................ 15
13. OTHER POLICIES APPLY ..................................................................................... 15
Amendments and Revisions .................................................................................... 15
14. EXCEPTIONS TO THE POLICY ............................................................................. 15
15. OTHER REQUIREMENTS ...................................................................................... 15
Confidentiality Notices on E-Mails............................................................................ 15
Use of Encryption Software ..................................................................................... 16
Export Restrictions ................................................................................................... 16
File Sizes ................................................................................................................. 16
Where to go for help:
If you need assistance with any technical information included in this document,
or if you have additional questions, contact your manager or the head of Information Technology
or the Law Department.
Internal Use Only
Copyright © 2007-2013 Viad Corp. All rights reserved.
No part of this document may be reproduced without written permission of Viad Corp.
Revised
11/21/13
Technology Use Policy
1. PURPOSE
This policy provides rules and guidelines which govern the use of technology and electronic
communication. This policy is applicable to employees, agents, contract personnel and consultants, and
other authorized users (collectively and individually “personnel”) within Viad Corp and its subsidiaries and
affiliates (collectively and individually the “Company").
This policy supersedes all other Company policies with regard to accessing, retaining, monitoring,
disclosing, and properly using Company technology and electronic communications.
Definitions
The following definitions are used throughout, whether capitalized or not:
“.PST” is the file extension used for the personal folder files associated with Microsoft Outlook. Personal
folders in Microsoft Outlook are used to store e-mail messages outside of the user’s mailbox.
“Blog” is typically a website or news feed in which entries are posted on a regular basis, typically by an
individual person. Blogs are typically public forums potentially viewed worldwide that can be easily and
quickly created. Postings to a blog and contents of blogs are generally not retained on a user’s computer
but are maintained on the servers controlled by the blogging website or other service providers.
“Cardholder data” is any personally identifiable data associated with a cardholder. This could be an
account number, expiration date, name, address, social security number, CVV/CVC code, etc. All
personally identifiable information associated with the cardholder that is stored, processed, or transmitted
is also considered cardholder data.
"Confidential Information" generally means all Company information that has not been disclosed to the
public through authorized channels of the Company. There are two subsets of Confidential Information
that require heightened security and must be treated with the greatest of care by employees, independent
contractors, agents, contract personnel and consultants of the Company. Those two subsets include the
following:
(1) "Sensitive Confidential Information" means Confidential Information that, if divulged, could
compromise the Company or its employees, officers, directors, customers, suppliers or
associates (e.g. harm the Company's image, potentially result in litigation against the Company,
or put the Company at a competitive disadvantage), or could adversely affect the Company's
operations or customer service. Such information may include: potential and actual customer and
supplier lists and information; payroll data; employee information; financial data, customer credit
data; executive correspondence; and certain legal and regulatory information.
(2) "Material Non-Public Information" means Confidential Information that a reasonable
investor would consider important in arriving at a decision to buy, sell or hold Company stock.
Examples include dividend increases or decreases, earnings estimates, changes in previously
announced earnings estimates, expansion or curtailment of operations, a merger or acquisition
proposal or agreement, new products, unusual borrowings or securities offerings, major litigation,
extraordinary management developments, or purchases or sales of substantial assets of the
Company.
“E-mail” is an electronic mail message and/or a file attachment to an e-mail message that is generated
from or received by any e-mail application over the Internet or over the Company’s internal e-mail system.
“Electronic communication” is communication that occurs through the use of electronic hardware.
Electronic communication occurs via e-mail, the Internet, blogs including social media sites, message
boards, instant messaging, texting, etc.
Revised
11/21/13
3
Technology Use Policy
“Instant Messaging” or “IM” is essentially a conversation on a computer screen. The user creates an
account through an IM provider (e.g. Yahoo Messenger, MSN Messenger, Google Chat, AOL
Messenger) and then adds the names of contacts with similar IM accounts to an address-type book. This
enables the IM user to know when contacts are online and to initiate an online conversation with them.
Some IM programs allow the user to save a conversation; saved conversations may be stored on the IM
provider’s server, the user’s computer, or in the case of a Company-provided IM program (such as Office
Communicator and LivePerson), a Company server.
“Internet” is a worldwide network of connected computers that permits the transfer and sharing of
information, graphics, files, etc. It includes, but is not limited to:
•
World Wide Web
•
File Transfer Protocol (FTP), Newsgroups (Usenet) or Telnet
•
Bulletin board systems, chatrooms, blogs, electronic message boards, discussion groups, instant
messaging
•
Collaboration technology
•
E-commerce activities
•
Local area network or wide area network applications that may access or be accessed through
the Internet
“Law Department” refers to the Viad Corp Law Department.
“Outlook data” consists of information in the e-mail, calendar, contacts, tasks, notes and journal features
of the Microsoft Outlook program.
“PCI DSS” means Payment Card Industry Data Security Standard, and refers to a set of requirements
adopted by the payment brands (VISA and Mastercard) designed to ensure that all companies and
merchants that process, store or transmit credit card or debit card information maintain a secure
environment.
“PII” means personally identifiable information. This could include an employee’s, customer’s, or
vendor’s first and last name or first initial and last name, coupled with any additional information that
could lead to the identification of that particular individual including, without limitation: date of birth; social
security number; driver’s license number or any state-issued identification card number; and financial
account number, or credit or debit card number. Personally identifiable information is often contained in
personnel files, employment applications, credit applications, medical records and reports, background
check results, etc. In countries outside of the United States, PII may include a person’s race, ethnic
origin, political affiliations, trade union association, sexual orientation, religious or philosophical beliefs,
etc.
“Social Media” refers to social networking sites available via the Internet such as YouTube, Four
Square, Facebook, LinkedIn and Twitter. Companies often use social media sites for marketing their
goods and services to the public.
“Technology” is the application and use of tools and methods, machines and systems. Technology
includes devices and programs (e.g. personal computers, laptops, tablet devices, data storage devices,
cell phones, smart phones, software) that are used to process information, store data and communicate.
“Text Messages” or “Texting” is essentially a chain of conversations using your mobile phone; it is a
service feature (i.e. SMS messages) that must be enabled through the wireless service provider. Text
messages create unsecured records of the information being sent and are difficult to monitor and capture.
Revised
11/21/13
4
Technology Use Policy
2. USE OF TECHNOLOGY
The following statements apply equally to all Company-related electronic communication that occurs
through e-mails, the Internet, blogs, message boards, instant messaging, text messaging and social
media sites using devices such as personal computers, laptops, cell phones, smart phones and tablet
devices.
No Expectation of Privacy. The Company monitors use of Company technology systems, including
ongoing and random audits of all employee e-mail boxes, Internet usage including blogs and social media
sites, texting and instant messaging. The computers and other technology devices and related computer
or access accounts assigned to you are to assist in the performance of your job. You should not have an
expectation of privacy in anything (including internal and external e-mails) you create, store, send or
receive on the computer system or other technology devices (including cell phones, smart phones and
tablet devices) and all information transmitted or received may be captured through the internal
processing of the computer system or other technology devices. Employee-created passwords, whether
created for internal or external e-mails or for other access accounts, are not an indicator of personal
privacy. The computer system and other technology devices belong to the Company and your use of the
computer system and other Company owned or provided technology may be monitored. The Company
reserves the right to authorize random or specific reviews of user files to ensure compliance with this
policy, in accordance with applicable laws.
Waiver of Privacy Rights. Users expressly waive any right of privacy in anything they create, store,
send, or receive on the computer, other technology devices (including cell phones, smart phones and
tablet devices), or through the Internet or any other computer network. Users understand and consent to
the Company’s use of human or automated means to monitor use of its computer systems and other
technology resources. System administrators may change, bypass or disable a password or other
security mechanisms applicable to the Company technology systems at any time without permission or
advance notice to the user.
Intended Use. You may be given a computer or other technology devices for use in your job with the
Company. Use of personal technology devices like home computers for Company business is prohibited
(except for Outlook Web Access and Terminal Services) unless specifically authorized by your manager,
the Law Department and the head of Information Technology. Company data should not be sent to,
forwarded to, or reside on non-Company owned devices unless specifically authorized by your manager,
the Law Department and the head of Information Technology. The Company's technology is to be used
primarily for legitimate business purposes of the Company. Use of Company technology is limited to
Company employees and authorized persons and is intended for those activities that are related to
Company business.
Personal Use. Limited personal use of Company-owned computers and other technology devices
(including cell phones, smart phones and tablet devices) is allowed if each such use is (a) in compliance
with this policy and (b) reasonable in amount and does not interfere with work performance or business
needs. Excessive or unauthorized use of Company technology systems or Company-owned computers
and other technology devices is a violation of this policy and may result in disciplinary action up to and
including termination.
Ownership. All Company owned and issued technology devices, including without limitation computers,
laptops, cell phones, smart phones, and tablet devices, Company-associated social networking sites
including without limitation websites, YouTube videos, Facebook pages, Twitter accounts, LinkedIn
profiles, and blogs, and all information and any messages or communication that are created, sent,
received or stored on the Company's devices, social media or through the use of the Company’s
technology are the sole property of the Company and are not the property of the employee or other
persons.
Revised
11/21/13
5
Technology Use Policy
Duty to Report Inappropriate or Prohibited Uses of Company Technology and Electronic
Communications. All personnel have a duty to report prohibited uses of Company technology and
electronic communications. All reports may be made in person, in writing or by phone. You may inform
the head of Information Technology (if related to sending, receiving or viewing inappropriate material),
your manager, the Company’s Compliance Officer, an executive officer, Human Resources or the Law
Department. You may also use the confidential, toll-free Always Honest Hotline at 1-800-443-4113.
3. USING TECHNOLOGY FOR ELECTRONIC COMMUNICATIONS
Electronic Communications (including e-mails, the Internet, blogs, message boards, instant
messaging, texting and social media sites). Electronic communications must be treated as seriously
as other written communications, such as letters and faxes. All electronic communication messages must
be professional, courteous, and consistent with the Company's policies of ethical conduct, compliance
with applicable laws, and proper business practice. The sender of an electronic communication must be
able to justify the content of his or her electronic communications.
Before sending an electronic communication, the sender is responsible for considering whether an
electronic communication is the appropriate means of communication. Situations where electronic
communications can be inappropriate include communications:
•
of complex issues or concepts;
•
of a confidential or sensitive nature (see Section 6 below);
•
of messages having a meaning that is sensitive to tone and interpretation (e.g. sarcasm);
•
about an individual; and
•
to resolve a disagreement.
Electronic communications lack the advantages of body language and intonation, which are present in
face-to-face communications. You may inadvertently put the wrong message across. Sarcasm and
humor in an electronic communication, for example, may not be conveyed properly or may be interpreted
by the reader inconsistently with your intent. Remember that once a message is sent, it cannot be
recalled, so take care when sending messages in the “heat of the moment.”
Examples of prohibited electronic communication include, but are not limited to:
•
Sending, accessing, browsing, sharing, downloading, or storing any electronic communication or
other material of an insensitive, fraudulent, racially offensive, defamatory, discriminatory,
obscene, sexual or harassing nature or otherwise unlawful.
•
Sending or sharing electronic communications which disparage or are harmful to the Company or
which show the Company in an unprofessional light.
•
Unauthorized sharing of critical or confidential business information belonging to the Company or
other third parties including the Company’s partners, competitors, customers and clients.
•
Unauthorized use of trademarks, trade names, trade secrets, logos, copyrighted materials and
other intellectual property belonging to the Company or other third parties including the
Company’s partners, competitors, customers and clients; this includes use on your social media
sites like Facebook.
•
Disseminating or storing commercial or personal advertisements, solicitations, promotions,
destructive programs (that is, virus, self-replicating, or other harmful or productivity-reducing
code), political information, or any other unauthorized material.
•
Wasting computer resources by, among other things, sending non-Company related mass
communications, personal chain letters, forwarding and circulating jokes and cartoons, etc.
Revised
11/21/13
6
Technology Use Policy
•
Automatically forwarding messages from your Company-issued mailbox to another mailbox
without approval by your manager, the Law Department and the head of Information Technology.
•
Forwarding an e-mail, e-mail attachment or other electronic communication from the Company’s
attorneys that is reasonably intended to be protected by the attorney-client privilege without the
attorney’s express permission.
•
Altering the "From" line, header information or other attribution-of-origin information in an
electronic communication.
•
Sending electronic communications under anonymous or pseudonymous names, or otherwise
disguising the identity of the message sender. Users must identify themselves honestly and
accurately when sending electronic communications.
Note: E-mails sent by designees of another e-mail user (e.g. sent “On behalf of…”) are permitted
when used for legitimate business purposes and when authorized.
Violations of these prohibitions may result in disciplinary action up to and including termination.
Users may not alter an electronic communication belonging to another user without first obtaining
permission from the owner of the message. Ability to read or alter an electronic communication belonging
to another user does not imply permission to read or alter that message. Users may not use the system
to “snoop” or pry into the affairs of other users by unnecessarily reviewing their electronic
communications.
Electronic communications must not be downloaded to, stored, originated from or read on personally
owned cell phones, smart phones, tablet devices or other handheld devices unless the device and the
activity is authorized by your manager, the Law Department and the head of Information Technology.
Personally owned devices shall adhere to Company security standards including the establishment and
use of a password.
Access to accounts for employees and other personnel leaving the Company will be made available to
the appropriate manager or his/her designee for a limited period of time. Managers should follow the
Company’s procedures for termination of employees and other personnel. Information Technology will
initiate the account access process with the appropriate personnel once they have been notified of the
departure.
The Internet. You may be provided with access to the Internet to assist in performing your job and
furthering the Company’s business interests. The Internet can be a valuable source of information and
research. Use of the Internet, however, must be tempered with common sense and good judgment.
Material that is fraudulent, harassing, embarrassing, sexually explicit, profane, obscene, intimidating,
defamatory, or otherwise unlawful or inappropriate may not be accessed from the Internet and displayed
on or stored in the Company’s computers or other technology devices. If you encounter or receive this
kind of material, immediately disconnect and report the incident to the head of Information Technology
and your manager immediately.
You are cautioned that the Internet contains information that may be offensive, sexually explicit, or
otherwise inappropriate. The Company is not responsible for material viewed or downloaded by users
from the Internet.
Social Media and Blogging Activities. We understand that social media can be a fun and rewarding
way to share your life and opinions with family, friends and co-workers around the world. However, use
of social media also presents certain risks and carries with it certain responsibilities. To assist you in
making responsible decisions about your use of social media, we have established these guidelines for
appropriate use of social media.
Revised
11/21/13
7
Technology Use Policy
In the rapidly expanding world of electronic communication, social media can mean many things. Social
media includes all means of communicating or posting information or content of any sort on the Internet,
including to your own or someone else’s website or blog, journal or diary, personal web site, social
networking or affinity web site, web bulletin board or a chat room, whether or not associated or affiliated
with the Company, as well as any other form of electronic communication. The same principles and
guidelines found in Company workplace and technology policies apply to your activities online.
Ultimately, you are solely responsible for what you post online. Before creating online content including
posts, tweets and YouTube videos, consider some of the risks and rewards that may be involved. Keep
in mind that any of your conduct, including conduct during non-work hours, that adversely affects your job
performance, the performance of your fellow employees or otherwise adversely affects clients, customers,
suppliers, people who work on behalf of the Company, or the Company’s legitimate business interests
may result in disciplinary action up to and including termination.
Carefully read the Company’s Code of Ethics and other applicable policies, including without limitation
those policies regarding harassment and discrimination and those policies and guidelines in the Always
Honest Compliance & Ethics Manual, and ensure your postings are consistent with and do not violate
those policies. Inappropriate postings that may include discriminatory remarks, harassment, and threats
of violence or similar inappropriate or unlawful conduct will not be tolerated and may subject you to
disciplinary action up to and including termination.
Be respectful, and always be fair and courteous to fellow employees, customers, members, suppliers or
people who work on behalf of the Company. Also, keep in mind that you are more likely to resolve workrelated complaints by speaking directly with your manager, co-workers or by utilizing our Always Honest
Hotline than by posting complaints to a social media outlet. Nevertheless, if you decide to post
complaints or criticism about the Company, fellow employees, customers, members, suppliers or people
who work on behalf of the Company, avoid using statements, photographs, video or audio that
reasonably could be viewed as malicious, obscene, threatening or intimidating, that disparage your fellow
employees, customers, clients, vendors or suppliers, or that might constitute harassment or bullying.
Examples of such conduct might include offensive posts meant to intentionally harm someone’s
reputation or posts that could contribute to a hostile work environment on the basis of race, sex, disability,
religion or any other status protected by law or company policy.
Be honest and accurate when posting information or news, and if you make a mistake, correct it quickly.
Be open about any previous posts you have altered. Remember that the Internet archives almost
everything; therefore, even deleted postings can be searched. Never post any information or rumors that
you know to be false about the Company or any of its subsidiaries or affiliates, fellow employees, clients,
customers, vendor, suppliers, people working on behalf of the Company or our competitors.
Post only appropriate and respectful content, subject to the following:
•
Maintain the confidentiality of our trade secrets and private or confidential information including
sensitive confidential information and material non-public information. Trade secrets may include
information regarding the development of systems, processes, products, know-how and
technology. Do not post internal reports, policies, procedures or other internal business-related
confidential communications.
•
Respect financial disclosure laws. It is illegal to communicate or give a “tip” on inside information,
or any other forward-looking or material non-public information, to others so that they may buy or
sell stocks or securities. Such conduct may also violate our financial information policies.
Posting confidential, sensitive or material non-public information a reasonable investor would
consider important in arriving at a decision to buy, sell or hold our stock could get you and us in
legal trouble, even if it is your own personal view or speculation. We may, from time to time, ask
you to discontinue posting about us or certain Company-related matters for a period of time if and
when it appears that such activity may violate certain legal or regulatory provisions the Company
must observe.
Revised
11/21/13
8
Technology Use Policy
•
Do not create a link from your blog, website or other social networking site to a Company website
without identifying yourself as an employee of the Company or one of its affiliates. You may not
propose or conduct any business on behalf of the Company using your personal social media
posts or blogs.
•
Express only your personal opinions. You are personally responsible for your own posts. Never
represent yourself as a spokesperson for the Company. If one of our affiliates is a subject of the
content you are creating, be clear and open about the fact that you are an employee and make it
clear that your views do not represent those of the Company, the affiliate, your fellow employees,
clients, customers, vendors, suppliers or people working on behalf of the Company. If you do
publish a blog or post online related to the work you do or subjects associated with the Company,
make it clear that you are not speaking on behalf of us. It is best to include a disclaimer such as
“The postings on this site are my own and do not necessarily reflect the views of Viad Corp or any
of its subsidiaries or affiliates.”
Refrain from using social media while on work time or on technology we provide, unless it is work-related,
posted to a Company-authorized site and consistent with the Technology Use Policy. Do not use any
Company email address or any other company-provided or related email address to register on social
networks, blogs or other online tools utilized for personal use. You must be authorized in advance to
participate in social media activities or blogging on behalf of or in the Company’s name, and to
use your Company-assigned e-mail address in conjunction with those activities. Remember all
Company-associated social networking sites, and their content, are owned by the Company, not you even
if you use your Company-assigned e-mail address to administer the site or post to the site. You may not
associate your Company-assigned e-mail address with your personal social media postings or blogs.
Retaliation is prohibited. We prohibit taking negative action against any personnel for reporting a possible
deviation from this policy or for cooperating in an investigation. Any Company personnel who retaliates
against anyone for reporting a possible deviation from this policy or for cooperating in an investigation will
be subject to disciplinary action, up to and including termination.
Company personnel should not speak to the media on the Company’s behalf without contacting the
Marketing or Communications Departments. All media inquiries should be directed to them. If you have
questions or need further guidance, please contact Human Resources, the Law Department or
Information Technology. When in doubt about any posting or other social media or blogging activity,
please ask first.
Instant Messaging. While IM resembles the casualness of a conversation, you do not have the ability to
hear the tone of the other speaker’s voice. Care should be taken to convey messages that are clear and
concise to avoid misunderstandings. IM acronyms, slang and abbreviations should be avoided unless
verifiably well known by the users of IM.
It is strictly prohibited to IM about financial data and other matters relating to internal controls.
The Company supported standard for IM client software is the use of Microsoft OCS. Downloading and/or
installing any other IM client software (including that software provided by IM service providers like Yahoo
Messenger, MSN Messenger, Google Chat and AOL Messenger) is prohibited.
Logging or capturing and saving IM discussions is prohibited unless specifically authorized by your
manager, the head of Information Technology and the Law Department.
Instant messaging on Company time should be limited to legitimate Company business.
Text Messaging. Text messaging creates a permanent and ongoing chain of communication between
mobile phone users. This chain of communication is difficult for the Company to monitor and imposes
significant burdens on the administration of the records created by texting. Texting creates an unsecure
record of the information being sent. In order to protect the sensitive and confidential information of the
Revised
11/21/13
9
Technology Use Policy
Company and its customers, the use of text messaging to negotiate business, resolve significant
business issues or for other material business purposes is prohibited; an e-mail or telephone call should
be used instead. This restriction applies to both Company-issued mobile phones as well as personal
mobile phones.
Text messaging is not the same as instant messaging. The prohibition against texting a Company
employee or customer regarding a significant or material business matter does not apply to the
transmission of Company information between or among one or more users of the Company’s IM
software.
Text messaging while driving is unsafe, imperils the safety of others and is illegal in many states,
provinces and localities. No text message is important enough to endanger yourself or others.
Other Methods of Electronic Communication. The general principles and policies stated above are
applicable to all forms of electronic communication and methods of technology use. In addition to those
specific forms and methods listed above, these principles and policies are applicable to message boards,
chat rooms, discussion groups, text messaging, etc.
4. RETENTION OF ELECTRONIC COMMUNICATIONS
E-Mail Retention. E-mails sent or received should be deleted promptly from your mailbox after reading
and acting upon them, and the e-mail must be deleted from your mailbox when it no longer has business
or administrative value.
Regardless of its stored form (e.g. electronic, in a .PST file, hard copy, etc.), no e-mail should be retained
for more than one year unless the e-mail continues to have legitimate business and administrative value.
E-mails that have legitimate business or administrative value are those that:
•
provide relevant and material information on active and ongoing projects, proposals or contract
management activities relating to how or why significant business decisions were made, what the
intent or purpose of a business decision, transaction or relationship is, or who was involved in the
decision making process;
•
directly relate to completed and closed projects, proposals or contract management activities that
are known to be recurring and in which the retention of significant and material records in
electronic form is considered essential to the successful renewal of the activity;
•
relate to legal, employment or regulatory issues, disputes, concerns or matters; and
•
have been deemed to be an exception to this policy in accordance with Section 14.
Regardless of its stored form, you must be able to justify the need to retain any e-mail sent or received
that is more than one year old.
E-mails must not be downloaded or electronically stored to CDs, thumb drives, other handheld devices or
portable data storage devices including cell phones, smart phones, tablets, etc. unless the device and the
downloading is authorized by your manager and the head of Information Technology. Personally owned
devices shall adhere to Company security standards including the establishment and use of passwords.
The foregoing deletion requirement does not apply when prohibited by law or when written instructions
are issued by the Law Department or when a written exception has been granted or issued.
Use of .PST files as an e-mail retention storage solution is strongly discouraged. Use of .PST files is
limited to those with a legitimate business reason and who have been specifically authorized by their
manager and the head of Information Technology.
Revised
11/21/13
10
Technology Use Policy
Retention of E-Mail Attachments and Electronic Documents. Most e-mail attachments are electronic
documents or records like word processing documents, spreadsheets and digital images. The Company’s
Records Management Policy applies to electronic documents and records as well as those documents
and records contained in more traditional forms like paper, microfilm and microfiche. It is the content of
the document or record that determines its retention period, not the form or format that the document or
record is contained in. Each user is responsible for correctly identifying and complying with any applicable
retention period for electronic documents and records. Refer to the Company’s Records Management
Policy for specific retention periods.
Retention of Other Forms of Electronic Communication. Unless otherwise specified, all other forms
of electronic communication should be deleted when they no longer have business or administrative
value. This includes instant messages, blogs and social media posts.
Retention in the Event of Dispute, Litigation, Subpoena, or Inquiry. In the event of any litigation,
subpoena, regulatory inquiry, criminal proceeding, or the like, Company personnel are prohibited from
altering, mutilating, concealing, deleting, discarding, or destroying any communication, including e-mails,
or any documents, whether created or stored electronically or not, relating in any way to the litigation,
subpoena, regulatory inquiry, criminal proceeding, or the like.
The Law Department will notify you of pending or threatened litigation or other legal proceedings, and
advise you of your retention obligations. The Law Department will also notify you when deletion of such
communications is permitted.
Back-Up. Backup tapes are used for disaster recovery only. The Company deletes and/or writes-over
backup tapes of electronic information stored on the Company network in accordance with Information
Technology policy and standards. E-mail backup tapes must be deleted or overwritten on a maximum 2
week cycle. Backup tapes for other data stored on the Company network must be deleted or overwritten
on a maximum 12 week cycle. Archival of backup tapes is prohibited unless required for legal or
regulatory purposes.
5. APPROPRIATE AND INAPPROPRIATE USES OF TECHNOLOGY
Appropriate Uses. Appropriate use of Company-provided technology includes:
•
Communicating with business clients and coworkers
•
Conducting business research
•
Taking training courses
•
Tracking packages or shipments
•
Conducting business intelligence
•
Obtaining directions, maps, activities, or other information directly related to the performance of
your job
Inappropriate Uses. Inappropriate use of Company-provided technology includes, but is not limited to:
•
Accessing adult-oriented information
•
Sending, receiving, or storing information or images that are prohibited by law
•
Knowingly introducing a virus or other destructive file, gained from the Internet, into the Company
network
•
Downloading, for personal use, music (e.g. MP3, WMA, WAV, etc.), audio or video files, games,
programs or other software
Revised
11/21/13
11
Technology Use Policy
If users abuse their use of technology or forms of electronic communication, access may be revoked and
they may be subject to disciplinary action, including possible termination of employment, cancellation of
contract, and/or civil and criminal liability.
Except as noted above, anonymous or pseudonymous electronic communications are prohibited.
6.
SPECIAL RULES FOR
COMMUNICATIONS
CONFIDENTIAL
INFORMATION
IN
ELECTRONIC
Definitions: "Confidential Information" generally means all Company information that has not been
disclosed to the public through authorized channels of the Company. There are two subsets of
Confidential Information that require heightened security and must be treated with the greatest of care by
employees, independent contractors, agents, contract personnel and consultants of the Company. Those
two subsets include the following:
(1) "Sensitive Confidential Information" means Confidential Information that, if divulged, could
compromise the Company or its employees, officers, directors, customers, suppliers or associates (e.g.
harm the Company's image, potentially result in litigation against the Company, or put the Company at a
competitive disadvantage), or could adversely affect the Company's operations or customer service. Such
information may include: potential and actual customer and supplier lists and information; payroll data;
employee information; financial data, customer credit data; executive correspondence; and certain legal
and regulatory information.
(2) "Material Non-Public Information" means Confidential Information that a reasonable investor would
consider important in arriving at a decision to buy, sell or hold Company stock. Examples include
dividend increases or decreases, earnings estimates, changes in previously announced earnings
estimates, expansion or curtailment of operations, a merger or acquisition proposal or agreement, new
products, unusual borrowings or securities offerings, major litigation, extraordinary management
developments, or purchases or sales of substantial assets of the Company.
Use of Confidential Information. All Confidential Information must be used solely for proper Company
purposes and must never be distributed by electronic communication or through technology use to
unauthorized persons or used for furthering private interests. The individual who creates electronic
communication is responsible for ensuring that all recipients of the communication are authorized to
access the type of information contained within the communication and any attachments. When unsure
about who is authorized to access a certain type of information, the individual initiating the electronic
communication must check with an appropriate manager.
Sensitive Confidential Information and Material Non-Public Confidential Information should not be placed
directly in electronic communications being transmitted to persons outside of the Company or stored on a
laptop or portable electronic storage media device unless the communication is encrypted, utilizes a
comparable security device, or the communication is placed in a password-protected document. If a
password-protected document is used, it should be attached to the electronic communication, and only
the sender and the user are permitted to know the password to open the document. The password must
be conveyed separately from the electronic communication containing the password-protected document
and in a method other than by electronic communication. Contact the Global Service Desk for assistance
with password protection issues.
Sending an e-mail or e-mail attachment or other electronic communication containing Sensitive
Confidential Information or Material Non-Public Confidential Information to a person's personal e-mail
address or personal computer, laptop, portable electronic storage media device, or other electronic
device is strictly prohibited unless authorized by the Law Department. Accessing e-mail or e-mail
attachments or other electronic communication containing Sensitive Confidential Information and/or
Material Non-Public Confidential Information on a personal computer, laptop or electronic device that is
not Company-provided is prohibited, unless appropriate security measures are used as issued and
Revised
11/21/13
12
Technology Use Policy
authorized by the Law Department and the head of Information Technology.
Confidential Information including financial information should never be divulged in a social media post,
blog, message board, chat room, discussion group or through IM or text messaging.
7. SECURITY AND PROTECTION OF CUSTOMER’S PAYMENT CARD INFORMATION
Company personnel who handle or have access to a customer’s credit card or debit card information
must protect that information in accordance with the Company’s established PCI DSS policy, including
without limitation:
•
Restricting access to cardholder data to those with a business need to know
•
Restricting access to the physical cardholder data
•
Entering cardholder data into approved business applications only, and only in the input fields
clearly marked for card information
•
Securing any paperwork containing cardholder data in a safe location, and shredding the
paperwork when the transaction is processed
•
Using only Company-approved methods of transporting and transmitting cardholder data;
cardholder data, in particular full card numbers, should not be transported via laptops, portable
electronic storage media devices, or other electronic devices including smart phones and should
not be transmitted via email, email attachments, instant messaging, chat or other similar tools
•
Reporting any known or suspected security breaches to your manager and the head of
Information Technology immediately
•
Refrain from using cardholder data without prior authorization from the customer.
8. SECURITY AND PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION
Company personnel who handle or have access to personally identifiable information or PII of customers,
vendors, suppliers and fellow Company personnel must protect that information in accordance with the
Company’s established policies, including without limitation:
•
Restricting access to PII to those with a business need to know
•
Restricting access to the physical personal data, including personnel files, employment
applications, credit applications, customer/client files, medical records and reports, etc.
•
Entering PII into approved business applications only, and only in the input fields clearly marked
for such information
•
Securing any paperwork containing PII in a safe location
•
Using only Company-approved methods of transporting and transmitting PII; PII should not be
transported via laptops, portable electronic storage media devices, or other electronic devices
including smart phones and should not be transmitted via email, email attachments, instant
messaging, chat or other similar tools unless the data is encrypted or otherwise protected from
unintentional disclosure
•
Reporting any known or suspected security breaches to your manager and the head of
Information Technology immediately
9. USE OF NON-COMPANY OWNED TECHNOLOGY DEVICES
Company personnel may use personal (non-Company owned) technology devices like home computers,
laptops, cell phones, smart phones, tablet devices and other handheld devices for Company business
Revised
11/21/13
13
Technology Use Policy
when authorized by your manager, the Law Department and the head of Information Technology, but only
when appropriate security measures have been implemented including the use of passwords and
Terminal Services (e.g. Citrix, etc.). However, use of Outlook Web Access on a non-Company owned
device is permitted without prior authorization.
Company data, including any Company data contained in or transmitted via e-mail, or contained in
electronic documents or other forms of electronic communication including blogs, social media posts, text
messaging and instant messaging, should not be sent to, forwarded to, or reside on non-Company owned
technology devices unless specifically authorized by your manager, the head of Information Technology
and the Law Department. In the event of litigation, governmental investigation or other proceedings, the
Company may be required, pursuant to a discovery request or in compliance with other obligations, to
search for, identify, retrieve and retain Company data wherever and however that Company data is
stored. Your personal technology devices, and any information contained or stored in them (e.g. personal
financial information, personal photographs, etc.), may be confiscated, searched, copied, imaged, or
otherwise compromised should your personal technology device be used, in any manner whatsoever, for
Company business.
10. USER IDS AND PASSWORDS
Users are responsible for safeguarding their User IDs and passwords for access to the computer system
and other technology devices. User IDs, passwords and systems security (access rights) are determined
and documented in the employee’s or other personnel’s user access documentation. This information is
strictly confidential and is not to be shared with any person(s) or organization(s).
•
User IDs and passwords should not be printed, stored online, or given to others.
•
Users are responsible for all transactions made using their IDs and passwords.
•
No user may access the computer system or other technology device with another user's ID and
password or account.
•
If you discover that your user ID or password has been compromised, change it immediately and
notify your manager and the head of Information Technology.
11. VIRUSES
Virus Detection. Viruses can cause substantial damage to computer systems and other technology
devices. Each user is responsible for taking reasonable precautions to ensure he or she does not
introduce viruses into the Company's network and technology devices. All material received on floppy
disk or other magnetic storage, flash or optical medium, all material received via electronic
communication, and all material downloaded from the Internet or from computers or networks that do not
belong to the Company must be scanned for viruses and other destructive programs before being placed
onto the computer system or other technology devices. All disks transferred to the Company's computers
or network must be scanned for viruses.
If you suspect that a virus has been introduced into the Company’s network, notify Information
Technology and your manager immediately.
E-Mail Attachments. The following apply to e-mail attachments:
•
Ensure that virus scanning is enabled on your computer, and that it scans e-mail attachments.
Notify Information Technology immediately if you encounter a virus.
•
Never open a file attachment from a source you do not recognize or trust. Viruses can be
attached to file attachments, and when opened, spread into the Company network.
•
When opening an attachment, if prompted to disable all macros, do so until you are sure that the
Revised
11/21/13
14
Technology Use Policy
macros are not malicious. If a user is uncertain as to the effect of this action, the user should
contact Information Technology.
12. VIOLATIONS AND REPORTING VIOLATIONS
Violations. Violations of this policy will be taken seriously and may result in disciplinary action, including
termination of employment, cancellation of contract, and/or civil and criminal liability.
Reporting Violations. Users who become aware of anyone using computer resources for unauthorized
activities are required to report the incident immediately to management. Failure to report improper
activities may result in disciplinary action, including termination of employment or cancellation of contract.
All reports may be made in person, in writing or by phone. You may inform the head of Information
Technology (if related to sending, receiving or viewing inappropriate material), your manager, the
Company’s Compliance Officer, an executive officer, Human Resources or the Law Department. You may
also use the confidential Always Honest Hotline available in your area (toll-free in the U.S. at 1-800-4434113).
13. OTHER POLICIES APPLY
All existing Company policies apply to employees’ and other personnel’s conduct in connection with
technology use and electronic communication, including but not limited to, Company policies regarding
intellectual property, insider trading, misuse of Company property, discrimination, harassment, sexual
harassment, information, data security, and confidentiality, including with specificity the following:
•
Company’s Code of Ethics
•
Company’s Always Honest Compliance & Ethics Policy and Manual
•
Company’s Corporate Policy Manual
•
Company’s Security Policies
•
Information Technology policies posted on the Company’s intranet and/or in the Information
Technology Standards Manual
Amendments and Revisions. This policy and any other Company policy may be amended or revised
from time to time as need arises, as authorized by the President and Chief Executive Officer of Viad
following recommendation by the Records Committee.
14. EXCEPTIONS TO THE POLICY
Written exceptions to this policy may be granted when there is a legitimate ongoing business or
administrative need to retain the electronic communication or when there is a regulatory or legal
requirement or obligation to do so. Any and all requests for exceptions to this policy must be in writing,
signed by the President and Chief Executive Officer of the operating company, or an executive officer of
Viad, and submitted to Viad Corp’s Records Committee. Your manager can process an exception request
on your behalf in coordination with the head of Information Technology and the Law Department.
Exception requests considered by the Records Committee will be submitted to the Chief Compliance
Officer for approval or denial as recommended by the Records Committee. Notice of approved or denied
exception requests will be returned to you with a copy to Information Technology and the Law
Department.
15. OTHER REQUIREMENTS
Confidentiality Notices on E-Mails. All e-mails sent by Company personnel should contain the
appropriate confidentiality notice. The following standard notice should be used by all personnel other
than those in the Law Department:
Revised
11/21/13
15
Technology Use Policy
CONFIDENTIAL NOTICE: This e-mail transmission (and the attachments, if any,
accompanying it) may contain confidential information. The information is intended only
for the use of the intended recipient. If you are not the intended recipient, you are hereby
notified that any forwarding, disclosure, copying, distribution, or the taking of any action in
reliance on the contents of this information is strictly prohibited. Any unauthorized
interception of this transmission is illegal under the law. If you have received this
transmission in error, please promptly notify the sender by reply e-mail, and then destroy
all copies of the transmission.
Attorneys and other personnel in the Law Department should use the following notice:
DO NOT FORWARD WITHOUT PERMISSION; PRIVILEGED & CONFIDENTIAL: This
e-mail transmission (and the attachments, if any, accompanying it) may contain
confidential information protected by privilege, including, but not limited to, the attorneyclient privilege. The information is intended only for the use of the intended recipient. If
you are not the intended recipient, you are hereby notified that any forwarding,
disclosure, copying, distribution, or the taking of any action in reliance on the contents of
this information is strictly prohibited. Any unauthorized interception of this transmission is
illegal under the law. If you have received this transmission in error, please promptly
notify the sender by reply e-mail, and then destroy all copies of the transmission.
Information Technology will append the appropriate confidentiality notice to all outbound e-mail messages
if not already present as part of the sender’s e-mail signature.
Note: Communications from attorneys that are reasonably intended to be protected by the attorney-client
privilege may not be forwarded without the sender's express permission.
Use of Encryption Software. Users may not install or use encryption software on any of the Company's
computers without first obtaining written permission from Information Technology. Users must not use
passwords or encryption keys that are unknown to their managers or Information Technology.
Note: This password requirement applies only to the use of encryption software and does not apply to
Windows login passwords or other similar passwords.
Export Restrictions. The United States and Canadian federal governments have imposed restrictions
on export of programs or files containing encryption technology, such as e-mail programs that permit
encryption of messages and electronic commerce software that encodes transactions. Software or other
products containing encryption technology are not to be placed on the Internet or transmitted in any way
outside of the United States or Canada, as the case may be, without prior written authorization from the
head of Information Technology.
File Sizes. Be cautious in sending large files and attachments over 10 megabytes (10 Mb). Large files
can slow or stop network traffic and cause delay to critical systems. Contact Information Technology to
send a large file or use file compression utilities, or if you have access, use the FTP site.
Revised
11/21/13
16
Acknowledgement of
Technology Use Policy
I acknowledge electronic access to, or receipt of, a copy of the following Company policies related to
use of Company-owned computers, e-mail systems, the Internet and other technology:
•
Technology Use Policy
•
Always Honest Compliance & Ethics Manual ("Company E-Mail and Internet
Access" section)
•
Corporate Policy Manual
•
Information Technology Policies
I affirm that I have read and will abide by the policies of the Company regarding computer, e-mail,
Internet and other technology usage. In particular, I understand:
1. That these policies govern the acceptable use of all company-owned and issued computer
hardware, software, communications and networking systems;
2. That these policies protect the Company, its employees and business partners against
unauthorized or abusive use and removal or destruction of critical or confidential business
information;
3. That the Company has the complete authority to monitor my computer usage, e-mail
communications, Internet usage and use of other technologies;
4. That the Company may monitor all technology usage on a routine and/or special case basis; and
5. That any violation by me of the Company’s computer, e-mail, Internet and other technology use
policies may result in a loss of access to the technology, disciplinary action (including
employment termination), or legal action.
I acknowledge that the Company solely owns the systems and technology employed throughout the
Company, Company-associated social media sites and the information contained therein.
I agree to follow all standards, policies and procedures applicable to the use of technology in
connection with my employment and relationship to Viad Corp and its subsidiaries. I expressly
waive any right of privacy in anything I create, store, send, or receive on the computer or through the
Internet or any other computer network. I understand and consent to the Company’s use of human
or automated means to monitor use of its computer systems and other technology resources.
System administrators may change, bypass or disable my password or other security mechanisms
at any time without permission or advance notice to me.
SIGNATURE:
PRINT NAME:
PRINT COMPANY NAME:
PRINT JOB TITLE:
PRINT DEPARTMENT NAME:
Revised 11/21/13
DATE: