Acceptable Use Policy

Acceptable Use Policy

SOC2 CertificationNetspective Unified Process
 

Netspective Communications LLC outlines the policy for acceptable use of computer equipment with the aim of protecting both the authorized user and the Netspective Communications LLC from risks such as virus attacks, compromise of network systems and services, and legal issues. The policy governs the use of information, electronic and computing devices, and network resources for conducting Netspective Communications LLC business or interacting with internal networks and business systems, regardless of ownership. All personnel, including employees, volunteers, contractors, consultants, and third parties, must exercise good judgment in accordance with Netspective Communications LLC policies and standards, as well as local laws and regulations. [FII-SCF-011-HRS-05.1]

Netspective Communications LLC owns all electronic files created, sent, received, or stored on equipment owned, leased, or administered by Netspective Communications LLC or under its custody and control.

Netspective Communications LLC IT employees may access electronic files created, sent, received, or stored on equipment owned, leased, or administered by Netspective Communications LLC , or otherwise under its custody and control at any time, without the knowledge of the user, sender, recipient, or owner. These files are not private. Appropriate personnel may access electronic file content in accordance with our Privacy policy.

General Use and Ownership

Project Managers must authorize and submit access requests for employees to gain access to computer systems. Authorized users are responsible for all activity that occurs under their username.

Authorized users should understand that any data and files they create on corporate systems become the property of Netspective Communications LLC. There is no guarantee of privacy or confidentiality for any information stored on any network device belonging to Netspective Communications LLC because of the need to protect its network.

For security and network maintenance purposes, individuals authorized by the Netspective Communications LLC IT Department may monitor equipment, systems, and network traffic at any time. The IT Department of Netspective Communications LLC has the right to conduct periodic audits of networks and systems to ensure compliance with this policy. The IT Department also has the right to remove any non-business-related software or files from any system.

Security and Proprietary Information

Authorized users should secure all PCs, laptops, and workstations with a password-protected screensaver with the automatic activation feature set at 10 minutes or less. Additionally, they must lock down their PCs, laptops, and workstations by locking when the host will be unattended for any amount of time. Employees must log-off or restart their PC after their shift.

Netspective Communications LLC proprietary information stored on electronic and computing devices, whether owned or leased by Netspective Communications LLC , the employee, or a third party, is the sole property of Netspective Communications LLC . All proprietary information must be protected through legal or technical means.

All users must immediately report any theft, loss, or unauthorized disclosure of Netspective Communications LLC proprietary information to their immediate supervisor and/or the IT Department. Additionally, they must report any weaknesses in Netspective Communications LLC computer security and any incidents of possible misuse or violation of this agreement to their immediate supervisor and/or the IT Department.

Unacceptable Use

The policy prohibits the following activities in general. However, employees may be exempted from these restrictions during the course of their legitimate job responsibilities (e.g., systems administration staff may have a need to disable the network access of a host if that host is disrupting production services).

No employee, volunteer/director, contractor, consultant, or temporary employee of Netspective Communications LLC is authorized to engage in any activity that is illegal under local, state, federal, or international law while utilizing Netspective Communications LLC -owned resources.

The lists below are by no means exhaustive, but provide a framework for activities that fall into the category of unacceptable use.

System and Network Activities

The following activities are prohibited by users, with no exceptions:

  1. Users are prohibited from violating the rights of any person or company protected by copyright, trade secret, patent, or other intellectual property, or similar laws or regulations, including, but not limited to, installing or distributing “pirated” or other software products that are not appropriately licensed for use by Netspective Communications LLC.
  2. Users are prohibited from copying copyrighted material, including but not limited to digitization and distribution from copyrighted sources, copyrighted music, and installing any copyrighted software for which Netspective Communications LLC or the end-user does not have an active license. Users must report unlicensed copies of installed software to IT (contact@medigy.com).
  3. Users are prohibited from introducing malicious programs into the network or server (e.g., viruses, worms, Trojan horses, ransomware, etc.).
  4. Users are prohibited from revealing their account password to others or allowing others to use their account, including family and other household members when work is being done at home.
  5. Users are prohibited from using a Netspective Communications LLC computing asset to actively engage in procuring or transmitting material that violates sexual harassment or hostile workplace laws.
  6. Users are prohibited from attempting to access any data, electronic content, or programs contained on Netspective Communications LLC systems for which they do not have authorization, explicit consent, or implicit need for their job duties.
  7. Users are prohibited from installing any software, upgrades, updates, or patches on any computer or information system without the prior consent of Netspective Communications LLC IT.
  8. Users are prohibited from installing or using non-standard shareware or freeware software without Netspective Communications LLC IT approval.
  9. Users are prohibited from installing, disconnecting, or moving any Netspective Communications LLC-owned computer equipment and peripheral devices without the prior consent of Netspective Communications LLC’s IT Department.
  10. Users must obtain prior IT compatibility review before purchasing software or hardware for Netspective Communications LLC use.
  11. Users are prohibited from purposely engaging in activity that may degrade the performance of information systems, deprive an authorized Netspective Communications LLC user access to a Netspective Communications LLC resource, obtain extra resources beyond those allocated, or circumvent Netspective Communications LLC computer security measures.
  12. Users are prohibited from downloading, installing, or running security programs or utilities that reveal passwords, private information, or exploit weaknesses in the security of a system. For example, users must not run spyware, adware, password cracking programs, packet sniffers, port scanners, or any other non-approved programs on Netspective Communications LLC information systems. The Netspective Communications LLC IT Department is the only department authorized to perform these actions.
  13. Users are prohibited from circumventing user authentication or security of any host, network, or account.
  14. Users are prohibited from interfering with or denying service to any user other than their own host, such as a denial of service attack.
  15. Users are prohibited from using any program/script/command or sending messages of any kind with the intent to interfere with or disable a user’s terminal session, via any means, locally or via the Internet/Intranet/Extranet. Access to the Internet at home from a Netspective Communications LLC-owned computer must adhere to all the same policies that apply to use

Incidental Use

As a convenience to the Netspective Communications LLC user community, incidental use of information systems is permitted.
The following restrictions apply:

  1. Project Manager must supervise their employees regarding excessive use, and Authorized Users must exercise good judgment regarding the reasonableness of personal use.
  2. Netspective Communications LLC approved users are restricted to incidental personal use of electronic mail, internet access, fax machines, printers, copiers, and so on. It does not extend to family members or other acquaintances.
  3. Management’s prior approval must be obtained if incidental use results in direct costs to Netspective Communications LLC.
  4. Incidental use must not interfere with the normal performance of an employee’s work duties.
  5. Users must not send or receive any files or documents that may cause legal action against or embarrassment to Netspective Communications LLC.
  6. Nominal storage is permitted for personal email messages, voice messages, files, and documents within Netspective Communications LLC’s information systems.
  7. Netspective Communications LLC owns all messages, files, and documents located on its information systems, including personal messages, files, and documents. They may be subject to open records requests and may be accessed in accordance with this policy.

Review and Acceptance

All Netspective Communications LLC staff is responsible for review and acceptance of Policy 1: Acceptable Use upon starting work at Netspective Communications LLC (see Exhibit A).
New employee onboarding and training shall include this Policy 1 at a minimum, and in addition to all other applicable training and orientation material, and instructions for acceptance shall be provided at that time. Signed acceptance will be received and retained by Information Technology management.

EXHIBIT A

[This exhibit is a copy of the current Acceptable Use of Information Systems receipt.]

Receipt of Acceptable Use of Information Systems

Please sign this form and return it to Information Systems

I have received a copy of the Netspective Communications LLC LLC Acceptable Use of Information Systems Policy. I understand the information in the Acceptable Use of Information Systems policy is a summary only, and it is my responsibility to review and become familiar with all the material contained in the Comprehensive IT Policy.
I understand the most updated policies and Bylaws will always be located on the intranet for my reference, and it will be my responsibility to review the policies and Bylaws as they are updated.
I further understand the content of the Comprehensive IT Policy supersedes all policies previously issued. I also understand that Netspective Communications LLC may supersede, change, eliminate, or add to any policies or practices described in the Comprehensive IT Policy.
My signature below indicates that I have received my personal copy of the Acceptable Use of Information Systems Policy, and it will be my responsibility to review the Comprehensive IT policies as they are updated.

User Signature****************__****************
User name (printed)_****************************
Date:**********************************__**

**Retain one copy of this Receipt for your records and return the other copy to Information Systems.


Approved by
Ajay Kumaran Nair on June 13, 2023 |
Last Updated by
Sreejith K on June 13, 2023