Introduction
This policy document tells you how you may use the Fiber Group Shpk Internet facility. It outlines your personal responsibilities and informs what you must and must not do.
The objective of this policy is to direct all users of the internet facility by:
- Providing guidance on expected working practice
- Highlighting issues affecting use
- Describing the standards that users must maintain
- Stating the actions that may be taken to monitor the effectiveness of this policy
- Warning users about the consequences of inappropriate use of the Internet service
The Internet facility is made available for the business purposes of the organization. A certain amount of personal use is permitted in accordance with the statements contained within this policy.
It is recognized that it is impossible to define precise rules covering all Internet activities available and adherence should be undertaken within the spirit of the policy to ensure productive use of the facility is made.
This policy covers all internet facilities that are provided by Fiber Group Shpk for the purpose of conducting and supporting official business activity through the organization’s network infrastructure.
Non-compliance with this policy could have a significant effect on the efficient operation of the organization and may result in financial loss and an inability to provide necessary services to our customers. If any user is found to have breached this policy, they will be subject to disciplinary procedure. If a criminal offence is considered to have been committed further action may be taken to assist in the prosecution of the offender(s).
If you do not understand the implications of this policy or how it may apply to you, seek advice in the first instance from your immediate manager.
The following policies and procedures are relevant to this document:
- Acceptable Use Policy
- Electronic Messaging Policy
- Information Security Policy
1. Internet Acceptable Use Policy
1.1 Business Use of the Internet Service
Your Internet access must be used in accordance with this policy for tasks reasonably related to your work including:
- Access to information that is pertinent to fulfilling the organization’s business obligations
- Access to customer IT Systems to fulfilling the organization’s business obligations
- The capability to post updates to organization-owned and/or maintained web sites
- An electronic commerce facility (e.g. purchasing equipment for the organization)
- Research
1.2 Personal Use of the Internet Service
The organization permits personal use of the Internet in your own time (for example during rest breaks), provided it does not interfere with your work. Any exception to this is at the discretion of your line manager.
The organization is not, however, responsible for any personal transactions you enter into - for example in respect of the quality, delivery or loss of items ordered. You must accept responsibility for, and keep the organization protected against, any claims, damages, losses or the like which might arise from your transaction - for example in relation to payment for the items or any personal injury or damage to property they might cause.
If you purchase personal goods or services via the Internet service you are responsible for ensuring that the information you provide shows that the transaction is being entered into by you personally and not on behalf of the organization.
You should ensure that personal goods and services purchased are delivered to your home or other personal address and not delivered to organization property.
If you are in any doubt about how you may make personal use of the Internet Service you are advised not to do so.
All personal usage must be in accordance with this policy. Your computer and company-provided devices and any data held on them are the property of the organization and may be accessed at any time by the organization to ensure compliance with all its statutory, regulatory and internal policy requirements.
1.3 Internet Account Management, Security and Monitoring
Upon approval for internet access through the organization’s User Access Management Process, the organization will provide user credentials for use of your system. The IT Service Desk is responsible for the technical management of this account.
You are responsible for the security provided by your user credentials. Only you must know your credential and you must be the only person who uses your user.
You must not use anyone else’s credential.
The provision of Internet access is owned by the organization and all access is recorded, logged and interrogated for the purposes of:
- Monitoring total usage to ensure business use is not impacted by lack of capacity
- Monitoring all access for reports that are produced for line managers and auditors
1.4 Prohibited Uses of the Internet Service
Except where it is strictly and necessarily required for your work, for example IT audit activity or other investigation, you must not use your Internet account to:
- Create, download, upload, display or access knowingly, sites that contain pornography or other “unsuitable” material that might be deemed illegal, obscene or offensive
- Subscribe to, enter or use peer-to-peer networks or install software that allows sharing of music, video or image files
- Subscribe to, enter or utilize real time chat facilities such as chat rooms, text messenger or pager programs unless authorized
- Subscribe to, enter or use online gaming or betting sites
- Subscribe to or enter “money making” sites or enter or use “money making” programs
- Run a private business
- Download any software that is not trusted by organization
The above list gives examples of “unsuitable” usage but is neither exclusive nor exhaustive. “Unsuitable” material would include data, images, audio files or video files the transmission of which is illegal and material that is against the rule, essence and spirit of this and other organizational policies.
The organization will take steps to block the following categories of websites:
- Illegal
- Pornographic
- Violence
- Hate and discrimination
- Offensive
- Weapons
- Hacking
- Web chat
- Gambling
- Dating
- Radio stations
- Games
- Streaming Media
If you have inadvertently attempted to access such as site you should inform the IT Service Desk immediately.