Uploaded by Anwika

Revised Code of conduct

advertisement
Policy: Information and System Use for NonEmployee System Users
LAST REVISED: OCTOBER 15, 2021
To the extent persons who are not Travelers employees (“Non-Employees”) are granted access to or use of Travelersprovided technology resources, including, without limitation, computing equipment and network resources, software,
handheld devices, telephones, e-mail, voice mail, Internet access, instant messaging and other related equipment and
systems (“Information Resources”) in connection with their provision of services to Travelers, this Information and
System Use for Non-Employee System Users policy (“Policy”) sets forth the responsibilities and obligations pertaining
thereto. Travelers expects Non-Employees to exercise good judgment in their use of Information Resources and Travelers
business-related information. Additionally, Travelers expects Non-Employees to use extreme caution when opening
emails, links or attachments that may be part of an actual or simulated phishing attack or that could otherwise expose
Travelers to viruses and other attacks from cybercriminals seeking to defraud Travelers or its employees, customers or
partners. Both Information Resources and Travelers business-related information accessible through any Information
Resources and other means are valuable Travelers assets and must be used only as specifically authorized by
Travelers. Please read this Policy carefully.
Scope; Compliance Obligations
This Policy applies to Non-Employees providing services to The Travelers Indemnity Company, and/or any of its
subsidiaries, affiliates, and group companies in the U.S. and internationally (collectively, for purposes of this Policy,
“Travelers”). Subject to applicable law, this Policy applies to all use of Travelers Information Resources and information,
regardless of the time of use (during or outside business hours) or location.
This Policy is in addition to and does not replace any other policy or agreement involving Non-Employees’ provision of
services to Travelers.
Failure to comply with the requirements of this Policy may result in immediate termination of the Non-Employee’s
access to Information Resources, and/or appropriate legal action.
Use of Information Resources
Non-Employees should have no expectation of privacy in any Information Resources; to the contrary, Non-Employees
should expect that their activity is being monitored. All activity when using Information Resources, whether businessrelated or personal, is subject to monitoring and inspection by Travelers, including but not limited to the following: emails
sent and received, as well as links or attachments clicked or opened within emails (including internal and external
emails); instant messages sent and received; Internet usage (including web sites visited and time spent online); files
stored on a device, transferred to removable media or sent to a printer; software installed on a device; and applications
and data accessed. Travelers reserves the right to monitor or filter Non-Employees’ use of Information Resources at any
time, in its discretion. Information Resources are intended for business use for the benefit of Travelers, and any
information, including personal information, contained in, created on or transmitted through company systems or
Information Resources may be subject to such monitoring, inspection or filtering. If Travelers requests access to any
Information Resources in possession of Non-Employees (including but not limited to company-provided mobile devices
or laptops), Non-Employees may be required by Travelers to disclose the device passcode necessary for Travelers to
access and inspect the device.
No Travelers information may be transferred to, processed by, copied to, or stored on any computer systems, storage
devices, flash drives, mobile applications, hardware, email boxes, public site or other service, except as expressly
approved by Travelers. Unauthorized use or disclosure of Travelers information is prohibited.
Proprietary & Confidential: For Internal Use Only
Page 1 of 3
Electronic records pertaining to the use of Information Resources are maintained and may be accessed or reviewed by
Travelers in the course of system maintenance or investigation of possible misuse, or for other business reasons.
Such records may be provided to appropriate members of Travelers management and their agents. Travelers may
also provide such records to outside parties in its discretion, or in response to a governmental inquiry or when
legally required to do so (e.g., in response to a subpoena or court order). By using Travelers Information
Resources, Non-Employees are consenting to the collection, use, processing and disclosure of personal
information for the purposes set forth and as described in this section.
Copyright and Intellectual Property Rights Compliance: The Internet provides ready access to copyrighted material and other
protected intellectual property. No unauthorized use may be made of any such material in connection with provision of
services to Travelers.
Travelers is committed to compliance with the licensing requirements for software used on Travelers computers and other
equipment. In order to comply with contractual obligations and intellectual property laws and to ensure the security and
supportability of Travelers computing environment, only Travelers-authorized software and hardware peripherals may be used
on Travelers- provided equipment. All software used in conjunction with any Information Resources must be approved
by Information Technology and licensed to Travelers and used for legitimate business purposes only. The unauthorized
use, downloading, installation, copying or distribution of material is prohibited.
Travelers prohibits the use of software that attempts to bypass security controls and policies on Travelers systems.
Travelers has the right to remove and/or uninstall any software from Travelers equipment without notice.
Internet Services terms and conditions: Most websites have terms and conditions that govern the use of that website and
the information the site contains. Other websites specifically ask users to confirm agreement with the terms and
conditions, often as part of a registration process. No action may be taken that may appear to bind Travelers, such as
clicking to accept any third party’s online terms and conditions or registering for any on-line service on behalf of Travelers.
User IDs/Passwords/Security
Unique User IDs are assigned for Travelers network and systems access. Access is granted when the correct user ID
and corresponding password are entered. Passwords must not be shared or used in an unauthorized manner. NonEmployees are responsible for safeguarding passwords and for all activity executed under their Travelers assigned
accounts. Passwords do not confer any expectation of privacy with respect to use of password-protected Information
Resources. Upon the termination of assignments for or provision or services to Travelers, Non-Employees may be
required to inform Travelers of the passwords used to access Information Resources.
Authorized Use of Information Resources
Travelers Information Resources and information may be used only for Travelers-authorized purposes. The fact that
Information Resources or Travelers information stored on Information Resources are accessible does not necessarily
mean that access to them is authorized. Access is limited to those Information Resources and Travelers information that
are needed in connection with a Non-Employee’s provision of services to Travelers and that the Non-Employee is
authorized to access. For example, Non-Employees should not attempt to view a document if there is not a need to do so
in connection with a Non-Employee’s provision of services to Travelers, even if the Non-Employee has the ability to
locate and view the document. Travelers will endeavor to apply mechanisms to grant only appropriate access to users.
Such technology does not replace the responsibility to abide by this Policy and exercise good judgment.
Protecting Information Resources
Non-Employees are responsible for protecting all Travelers Information Resources and information to which they have
access, including safeguarding Travelers-issued devices from loss or theft. Travelers-issued equipment must be kept in a
safe location at all times – do not store it in an automobile or other places where it may be subject to theft.
Antivirus protection or other required security controls on any Travelers devices may not be disabled or bypassed.
When a Non-Employee’s provision of services to Travelers ends, or at any time at Travelers request, such Non- Employee will be
required to return all Travelers-provided equipment and Information Resources to Travelers.
Proprietary & Confidential: For Internal Use Only
Page 2 of 3
Protecting Connections to Travelers Networks
Only Travelers-authorized services, devices and facilities may be used to access Travelers networks, except as
expressly otherwise authorized by Travelers. Accessing Travelers networks in any other way or providing access to
Travelers networks for any unauthorized user, is a serious breach of security and is strictly prohibited.
Reporting Security Problems
All information security related concerns, security weaknesses and security incidents must be reported immediately,
including but not limited to any loss or theft of laptops, electronic devices, or storage media containing Travelers data. If
an incident is suspected, has taken place or is currently taking place, the Travelers Technology Service Center must be
notified immediately at 1-888-878-2411.
Proprietary & Confidential: For Internal Use Only
Page 3 of 3
Download