Computer, Telephone and Desk Use Policy
Overview
This policy should be applied whenever users use Northeast Data's computer and telephone resources to access information systems or to use Company and Customer information.
Computer and Telephone resources include, but are not restricted to the following:
- Northeast Data and Customer Facilities
- Company computers; including but not limited to portable laptops, computers, notebooks, tablets, mobiled devices
- Cameras, printers, storage devices including thumbdrives and usb devices
This policy aimes to mitigate the following risks
- Increased risk of equipment damage, loss or theft
- Accidential or deliberate overlooking by unauthorized individuals
- Unauthorized access to protected and restricted information
- Unauthorized introduction of malicious software and viruses.
Applying the Computer, Telephone, and Desk Use Policy
Computer Misuse
All users must adhere to the computer misuse policy which prohibits
- Unauthorized access to computer materials
- Unauthorized access with intent to comimit or comission further offences
- Unauthorized modification of computer materials.
All users must read and abide by Northeast Data's revelent information secuity policies
Use of Computer and Telephone Equipment
- Northeast Data will provide equipment to meet a business need, where predictable.
- Certain employees on contract will be issued customer provided equipment based on their business need.
- Users are responsible for taking care of the equipment that is issued to you and using it for the sole purpose for which it was supplied.
- Any user taking equpment off site (including a customer site) must have prior authorization
- Users are responsible for reporting any problems to Northeast Data of supplied customer or Northeast Data owned equipment
- Managers are responsible for reviewing the guidelines concerning the provision and personal use of Northeast Data equipment. Once approved, all users will be expected to adhere to these guidelines.
Clear Desk
All employees are required to hold securely company and customer information at all times by:
- Ensuring that protected and restricted information is securie when you are away from your desks
- Ensuring that computers are locked, when unattended, to prevent unauthorized access.
- At the end of all work days, ensure all customer and Northeast Data information is locked away
- Ensure that all paperwork is picked up on the printer at the end of the day. Documents should be collected once printed
Return Home