Employee Internet Use Monitoring and Filtering Policy

advertisement
DRAFT – PRIVILEGED & CONFIDENTIAL
1836 Technologies International Employee Network and
Internet Usage and Monitoring Policy
1. Policy Statement
1.1 This policy sets out rules that all 1836 Technologies personnel must follow when using the
1836 Technologies Network and/or the Internet from any 1836 Technologies computer, which
includes usage of both the World Wide Web (www) and 1836 Technologies’s internal intranet
systems(“1836 Technologies Network”)
1.2 This policy also applies to personal use of 1836 Technologies’s E-mail (Outlook) system.
However, additional confidentiality and liability conditions apply to e-mails.
1.3 This policy also explains what 1836 Technologies may do as an employer to lawfully monitor
and report use of the 1836 Technologies Network and/or 1836 Technologies computer and
investigate suspected systems breaches by personnel or third parties as well as unlawful
behavior.
1.4 This policy applies to any person who uses 1836 Technologies’s network and/or computers to
access the Internet and E-mail. Where the policy refers to “personnel” or “user” this means
anyone employed by 1836 Technologies or its parent company, any person carrying out work
activities on 1836 Technologies occupied premises who is not directly employed by 1836
Technologies (e.g. students, interns, work placements or volunteers), or any person providing a
service to 1836 Technologies under contract (independent contractor, consultant, or temporary
employee). Collectively referred to as “1836 Technologies Personnel”.
1.5 Access to the 1836 Technologies network and/or Internet access is provided primarily to 1836
Technologies personnel to use for 1836 Technologies’s business and to develop the skills and
knowledge of 1836 Technologies’s workforce to the benefit of its business objectives. A certain
amount of limited and responsible personal use is also permitted.
1.6 The wide range of information available on the 1836 Technologies Network, as well as the
Internet, and the nature and risks associated with the use of the Internet raises concerns about
security, integrity, confidentiality, monitoring and proper conduct.
1.7 Data Protection Statement.
1.7 1836 Technologies will monitor all user activity on the Internet at network level for the
purposes specified in Section 4.1. Information recorded as part of this automated monitoring
process includes user identification, domain names of websites visited, duration of visits, and files
uploaded to or downloaded from the Internet. Staff must be made aware that this monitoring may
reveal sensitive data about them, for example visits to websites which details the activities of a
particular political party or religious group might indicate the political opinion or religious belief of
that staff member, or self-help or health advice sites might identify a physical or mental health
condition. By carrying out such activities using 1836 Technologies’s Internet access facilities,
Staff consent to 1836 Technologies processing any sensitive personal data about them that may
be revealed through monitoring.
Personnel who do not consent must take responsibility for the maintenance of their own personal
privacy by not using 1836 Technologies systems to access this type of information.
2.0 Purpose
The purpose of this policy is to define standards for systems that monitor and limit web use from
any computer or host within 1836 Technologies's network. These standards are designed to
ensure that 1836 Technologies assets network, and Internet are used in a safe and responsible
manner, to ensure the confidentiality, integrity, and reliability of the 1836 Technologies network,
and to prevent intrusions into 1836 Technologies’s network, breaches of personal and sensitive
data, and ensure that employee web use by Personnel be monitored or researched in the event
of an incident.
DRAFT – PRIVILEGED & CONFIDENTIAL
3.0 Scope
This policy applies to all 1836 Technologies employees, contractors, vendors, users, and agents
with a 1836 Technologies-owned, contractor provided, government furnished or personallyowned computer or workstation connected to the 1836 Technologies network. This policy applies
to all end user initiated communications between 1836 Technologies’s network and the Internet,
including web browsing, instant messaging, file transfer, file sharing, and other standard and
proprietary protocols. Server to Server communications, such as SMTP traffic, backups,
automated data transfers or database communications are excluded from this policy.
This policy also explains what 1836 Technologies may do as an employer to lawfully monitor and
report use of the system and investigate suspected systems breaches by Personnel or third
parties as well as unlawful behavior.
4.0 Policy
4.1 Internet and Network Monitoring
4.1.1 1836 Technologies’s Information Technology Services (ITS) Group has incorporated
intrusion detection capabilities into its Network so as to provide information relating to
unauthorized or irregular behavior on any 1836 Technologies computer, network, or
telecommunication system, and analyzing them for signs of possible incidents, which are
violations or imminent threats or violation of computer security policies, acceptable use policies,
or standard security practices. This is done to protect 1836 Technologies and customer
resources and data maintained or stored on 1836 Technologies’s network.
4.1.2
To protect the integrity of 1836 Technologies’s Network and the data maintained on its
Network, the (ITS) Group will monitor Internet usage, network traffic on the 1836 Technologies
Network a well as all 1836 Technologies computers and devices, whether or not connected to the
1836 Technologies Network
4.1.3 Because information recorded by the automated monitoring systems can be used to
identify an individual user and show, for example, a website or document that a user has been
viewing and the time spent browsing, personnel must not assume privacy in their use of the 1836
Technologies’s systems, even when accessing the systems in their personal time i.e. out of paid
working hours.
4.1.4. In the event that ITS finds inappropriate activity or infestation of a company asset, this
information may then be shared with the appropriate 1836 Technologies management, the
Incident Response Team, and the Legal Department. 1836 Technologies reserves the right to
carry out detailed inspection, make a copy of any 1836 Technologies asset or devices containing
1836 Technologies data, where warranted, and to re-image any 1836 Technologies asset as
needed.
4.2 Access to Web Site Monitoring Reports
Authorized ITS members, Incident Response Team members, and the Legal Department will
have access to all reports and data if necessary in order to respond to a security incident. Internet
Use reports that identify specific users, sites, teams, or devices will only be made available to
personnel outside ITS upon written or e-mail request from an authorized Human Resources
Representative.
4.3 Internet Use Filtering System
4.3.1 1836 Technologies Personnel shall not access, transmit, upload, download, print, display
or otherwise disseminate the following types of material while on the 1836 Technologies Network
or while using 1836 Technologies assets:



Adult/sexually explicit and/or obscene images, data, or other material;
Tasteless, Defamatory, and/or Offensive Content;
Racially offensive;
DRAFT – PRIVILEGED & CONFIDENTIAL



Fraudulent or Otherwise unlawful; and/or;
Promotes violence, Intolerance and/or Hatred;
Any data capable of being transformed into obscene or indecent images or material
This includes obscene language, pornography, hostile material relating to gender, sex, race,
sexual orientation, religious, political convictions, disability or information that would cause or
promote incitement of hatred, violence or any other intimidating material that is designed or could
be used to cause offence, annoyance, inconvenience, needless anxiety or which would
contravene any Trust policy, in particular equal opportunities or harassment, or break any law.
4.3.2
1836 Technologies Personnel cannot:
i.
Intentionally circumvent security mechanisms such as cracking passwords,
exploiting system vulnerabilities, or using systems in excess of granted privileges;
ii.
Intentionally write, compile, copy, propagate, execute, or attempt to introduce any
malicious computer code designed to self-replicate, damage, or otherwise hinder the
performance of any computer system. Such software may be referred to as malware virus,
bacteria, worm, or a Trojan Horse; and
iii.
Transmit, upload, post or discuss Personal Identifiable Information (PII),
Protected Health Information (PHI), or sensitive Government or 1836 Technologies company data
with any third party without prior written authorization; or
4.3.3 In addition to the above, the Internet may not be accessed and used for any of the following:










Any activity that infringes copyright
Transmission of unsolicited commercial or advertising material
Deliberate unauthorized access to facilities or services accessible via the Internet
Corrupting or destroying another user’s data
Any activity that would violate the privacy of others
Any activity that would risk bringing the organization into disrepute or place the Trust in a
position of liability
Cause damage or disruption to organizational systems
Any activity that would violate the laws and regulations of the European Union
Not to be used for any secondary paid employment or voluntary services
Not to be used to run a personal business
4.3.4 The IT Department reserves the right to block access to Internet websites and protocols that
are deemed inappropriate for 1836 Technologies’s corporate environment. The following
protocols and categories of websites are examples of the type of websites that may be blocked:











Adult/Sexually Explicit Material
Advertisements & Pop-Ups
Gambling
Hacking
Illegal Drugs
Intimate Apparel and Swimwear
Peer to Peer File Sharing
SPAM, Phishing and Fraud
Spyware
Tasteless Defamatory, and/or Offensive Content
Racially offensive, promoting violence, Intolerance and/or Hatred
DRAFT – PRIVILEGED & CONFIDENTIAL
4.4 Internet Use Filtering Exceptions
If a site is blocked, then 1836 Technologies Personnel may only access that blocked site with
prior written permission if appropriate and necessary for business purposes. If any Personnel
need access to a site that is blocked and appropriately categorized, they must submit a request to
their appraisal manager. They will then present all approved exception requests to ITS in writing
or by email, and ITS will evaluate the request and consider unblocking that site or category.
5.0 Enforcement
5.1
1836 Technologies personnel are expected to report suspected violations of this policy to
the Legal Department.
5.2
Any employee found to have violated this policy may be subject to disciplinary action, up
to and including termination of employment.
6.0
Special Approval for European Union (EU) Users
Due to privacy concerns within the EU, special approvals and consents from the 1836
Technologies Personnel must be undertaken before a deep packet inspection is started. 1836
Technologies ITS will first ask the affected 1836 Technologies Personnel permission to conduct a
further analysis of their packet payloads to determine the cause of the alert. The user will then
be informed of their options, and if they agree to the inspection, they will be required to complete
the attached EU Consent Form. If the user consents to ITS inspecting the packet payload, ITS
will then examine the packets captured. If the user denies ITS’ request, the user may be
disconnected from the 1836 Technologies Network if it is determined that his/her computer will
continue to pose a risk to the 1836 Technologies Network.
7.0 Definitions
Hacking Sites - Sites that provide content about breaking or subverting computer security
controls.
Incident - A reported security event or group of events that has proven to be a verified information
technology security breach. An incident may also be an identified violation or imminent threat of
violation of information technology security policies, or a threat to the security of system assets.
Some examples of possible information technology security incidents are, but are not limited to:





Loss of confidentiality of information
Compromise of integrity of information
Loss of system availability
Denial of service
Misuse of service systems or information
Internet - an unclassified electronic communications network that connects computer networks
and organizational computer facilities around the world.
Internet Filtering – Using technology that monitors each instance of communication between
devices on the corporate network and the Internet and blocks traffic that matches specific rules.
Intrusion detection - The process of monitoring the events occurring in a computer system or
network and analyzing them for signs of possible incidents, which are violations or imminent
threats of violation of computer security policies, acceptable use policies, or standard security
practices.
IP Address – Unique network address assigned to each device to allow it to communicate with
other devices on the network or Internet.
Peer to Peer File Sharing – Services or protocols such as BitTorrent and Kazaa that allow
Internet connected hosts to make files available to or download files from other hosts. Social
DRAFT – PRIVILEGED & CONFIDENTIAL
Networking Services – Internet sites such as Myspace and Facebook that allow users to post
content, chat, and interact in online communities.
Phishing – attempting to fraudulently acquire sensitive information by masquerading as a trusted
entity in an electronic communication.
SMTP – Simple Mail Transfer Protocol. The Internet Protocol that facilitates the exchange of mail
messages between Internet mail servers.
SPAM – Unsolicited Internet Email.
User ID – User Name or other identifier used when an associate logs into the corporate network.
8.0 Revision History
__/2010 – Draft Completed, ________________
DRAFT – PRIVILEGED & CONFIDENTIAL
DRAFT EU Consent Form
I, _____________________, having been informed of my right not to have a search made of the
computer systems hereinafter mentioned without a search warrant and of my right to refuse
consent to such a search, hereby authorize 1836 Technologies International, Inc., Information
Technology Services, to conduct a complete search of the computer system : ______(insert host
name of the computer here)______ and its communications used to conduct 1836 Technologies
business. This search includes the deep packet inspection of all communications between the
aforementioned computer and the internet in an effort to safeguard the 1836 Technologies
network from malicious activities.
You are hereby authorized by me to take from this location any property which you need to
complete your analysis, assessment, and/or resolution of a possible privacy or internet security
incident. This written permission is being given by me voluntarily and without threats or promises
of any kind. I have not been threatened, placed under duress or promised anything in exchange
for my consent. I have read and understand this form. I understand the English language and
have been able to communicate with the 1836 Technologies ITS representatives regarding the
possible privacy and/or IT security incident.
I understand that I this consent only applies to this incident and that my further consent will be
required for any future incidents that may occur.
Dated, signed and witnessed
Signed:____________________________
Date:
____________________________
Witnessed: _________________________
Download