Acceptable Use Of The Internet: Difference between revisions
(Created page with " ==== Not a Fringe Benefit ==== Internet access and electronic mail services at Bloomex are provided primarily as tools for business, scholarly activity, and academic research purposes. These resources are intended for use in the performance of job duties and not as personal benefits. ==== Information Reliability ==== Information obtained from the Internet should be considered suspect until verified by a reliable source. Users should not rely solely on the claimed ident...") |
|||
Line 4: | Line 4: | ||
==== Information Reliability ==== | ==== Information Reliability ==== | ||
Information obtained from the Internet should be considered suspect until verified by a reliable source. Users should not rely solely on the claimed identity of a correspondent through external email or the Internet. Verification should be conducted through authoritative methods such as digital certificates or digital signatures. For more information on verification methods, users should consult the IT | Information obtained from the Internet should be considered suspect until verified by a reliable source. Users should not rely solely on the claimed identity of a correspondent through external email or the Internet. Verification should be conducted through authoritative methods such as digital certificates or digital signatures. For more information on verification methods, users should consult the IT Department. | ||
==== Downloading Software ==== | ==== Downloading Software ==== | ||
Users must not install software from the Internet unless specifically authorized by the Information Systems or IT | Users must not install software from the Internet unless specifically authorized by the Information Systems or IT Department. While downloading data files from the Internet is permitted, users must ensure these files are scanned for viruses before use. Copyright laws must be observed when downloading files. | ||
==== Sending Security Parameters ==== | ==== Sending Security Parameters ==== | ||
Line 16: | Line 16: | ||
==== Setting Up Extra Services ==== | ==== Setting Up Extra Services ==== | ||
Establishing any connection to the Bloomex network with a third party is prohibited unless the controls associated with this connection have been approved by the IT | Establishing any connection to the Bloomex network with a third party is prohibited unless the controls associated with this connection have been approved by the IT Department. Additionally, the establishment of electronic data interchange and other electronic business system arrangements requires approval from both the IT Department. | ||
==== Information Security Reports ==== | ==== Information Security Reports ==== | ||
Users who receive information about system vulnerabilities must forward this information to the IT | Users who receive information about system vulnerabilities must forward this information to the IT Department for evaluation and appropriate action. Redistribution of system vulnerability information is prohibited. | ||
These guidelines are designed to ensure that Internet use at Bloomex supports the company’s operational and security needs while complying with legal and ethical standards. | These guidelines are designed to ensure that Internet use at Bloomex supports the company’s operational and security needs while complying with legal and ethical standards. |
Latest revision as of 19:07, 2 September 2024
Not a Fringe Benefit
Internet access and electronic mail services at Bloomex are provided primarily as tools for business, scholarly activity, and academic research purposes. These resources are intended for use in the performance of job duties and not as personal benefits.
Information Reliability
Information obtained from the Internet should be considered suspect until verified by a reliable source. Users should not rely solely on the claimed identity of a correspondent through external email or the Internet. Verification should be conducted through authoritative methods such as digital certificates or digital signatures. For more information on verification methods, users should consult the IT Department.
Downloading Software
Users must not install software from the Internet unless specifically authorized by the Information Systems or IT Department. While downloading data files from the Internet is permitted, users must ensure these files are scanned for viruses before use. Copyright laws must be observed when downloading files.
Sending Security Parameters
Sensitive parameters such as credit card numbers, telephone calling card numbers, fixed passwords, or account numbers must not be transmitted over the Internet unless the connection is encrypted end-to-end.
International Transfer of Data
Transferring private or research information, such as human resources records or sensitive research, across international borders may be illegal in some countries. Before transferring any private or sensitive information across borders, users must consult with Bloomex General Counsel to ensure compliance with applicable laws.
Setting Up Extra Services
Establishing any connection to the Bloomex network with a third party is prohibited unless the controls associated with this connection have been approved by the IT Department. Additionally, the establishment of electronic data interchange and other electronic business system arrangements requires approval from both the IT Department.
Information Security Reports
Users who receive information about system vulnerabilities must forward this information to the IT Department for evaluation and appropriate action. Redistribution of system vulnerability information is prohibited.
These guidelines are designed to ensure that Internet use at Bloomex supports the company’s operational and security needs while complying with legal and ethical standards.