Personal Use Of Information Systems: Difference between revisions

From Bloomex Wiki
Jump to navigation Jump to search
(Created page with " ==== Personal Use ==== * '''Conduct Requirements:''' Users must not engage in any activities on Bloomex information systems that could damage the company’s reputation. Such conduct may result in disciplinary action, including revocation of network access privileges and termination of employment. ==== Testing Prohibition ==== * '''Unauthorized Testing:''' Users are prohibited from testing or attempting to compromise any information security mechanisms unless explici...")
 
 
Line 6: Line 6:
==== Testing Prohibition ====
==== Testing Prohibition ====


* '''Unauthorized Testing:''' Users are prohibited from testing or attempting to compromise any information security mechanisms unless explicitly authorized by the Enterprise IT Security Department.
* '''Unauthorized Testing:''' Users are prohibited from testing or attempting to compromise any information security mechanisms unless explicitly authorized by the IT Department.
* '''Restricted Tools:''' Users must not possess or use software or tools designed to compromise information security. (Refer to the registered Academic Research exception for authorized activities.)
* '''Restricted Tools:''' Users must not possess or use software or tools designed to compromise information security. (Refer to the registered Academic Research exception for authorized activities.)


This policy aims to safeguard Bloomex’s information systems and maintain the integrity and security of its operations.
This policy aims to safeguard Bloomex’s information systems and maintain the integrity and security of its operations.

Latest revision as of 19:11, 2 September 2024

Personal Use

  • Conduct Requirements: Users must not engage in any activities on Bloomex information systems that could damage the company’s reputation. Such conduct may result in disciplinary action, including revocation of network access privileges and termination of employment.

Testing Prohibition

  • Unauthorized Testing: Users are prohibited from testing or attempting to compromise any information security mechanisms unless explicitly authorized by the IT Department.
  • Restricted Tools: Users must not possess or use software or tools designed to compromise information security. (Refer to the registered Academic Research exception for authorized activities.)

This policy aims to safeguard Bloomex’s information systems and maintain the integrity and security of its operations.