This policy describes the acceptable and appropriate use of ManoByte's ’ computing resources.
The policy exists to protect the company, clients, authorized users, information assets, and systems. Unauthorized uses expose the company to many risks, including legal liability, virus attacks, and the compromise of information.
Scope
The term “User” refers to any employee, staff, or contractor associated with ManoByte', as well as any other individual with access to computers or other network devices that ManoByte has approved for connection to the company systems. This definition includes, but is not limited to, employees, staff, contractors, clients, visitors, or external individuals and organizations accessing network services via ManoByte's ’ computing facilities.
Policy
This policy applies to all users of computing resources owned or managed by ManoByte. Computing resources include all ManoByte's owned, licensed, or managed hardware and software and use of the company network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network. These policies apply to technology administered by ManoByte, and it also applies to the use of technology administered by ManoByte's ’ clients. All users of ManoByte's computing resources are required to comply with this policy.
Overview
ManoByte and its subsidiaries provide a wide variety of services to clients. To accomplish this, ManoByte provides and is provided with access to information assets, equipment, computing systems, and networks owned or managed by ManoByte is a privilege that imposes certain responsibilities and obligations and is subject to Company policies and codes and local and state, federal and international laws.
All users of these resources must comply with specific policies and guidelines governing their use and act responsibly while using shared computing and network resources, including wireless. This policy is intended to promote the appropriate, efficient, ethical, and lawful use of ManoByte and its clients’ computers, networks, and information.
Adherence to Laws & Regulations
Under no circumstances is a user of ManoByte authorized to engage in any activity that is illegal under local, state, federal, or international law or regulations while utilizing ManoByte's ' computing resources.
Acceptable Use Guidelines
The specific usage guidelines that follow are not intended to be comprehensive but rather to establish and clarify the intent of this policy. Situations not enumerated here will inevitably arise, and they should be interpreted according to the spirit of this policy.
The User may only use the computers, computer accounts, and computer files for which you have authorization.
The User may not use another individual's account or attempt to capture or guess other users' passwords.
The User is individually responsible for the appropriate use of all resources assigned, including any authorized shared accounts. Therefore, the User is accountable to the company for all use of such resources. As an authorized ManoByte user of resources, you may not enable unauthorized users to access resources.
The company is bound by its contractual and license agreements respecting certain clients and third-party resources; the User is expected to comply with all such agreements when using such resources.
The User should make a reasonable effort to protect passwords and to secure resources against unauthorized use or access.
The User must not attempt to access restricted portions of the network, an operating system, security software, or other administrative applications without appropriate authorization by the system owner or administrator.
The User must comply with the policies and guidelines for any specific set of resources to which you have been granted access. When other policies are more restrictive than this policy, the more restrictive policy takes precedence.
Unacceptable Use
Without limiting the general guidelines listed above, unless expressly agreed to by ManoByte Executives. The following activities are specifically prohibited:
Users may not attempt to disguise their identity, the identity of their account, or the machine that they are using. Users may not attempt to impersonate another person or organization. Users may likewise not misuse or appropriate the company’s name, network names, or network address spaces.
Users may not attempt to intercept, monitor, forge, alter, or destroy another User’s
communications. Users may not infringe upon the privacy of others’ computers or data. Users may not read, copy, change, or delete another User’s data or communications without the prior express permission of such other Users.
Users may not use ManoByte's Network in a way that.
(a) disrupts, adversely impacts the security of, or interferes with the legitimate use of any computer, the ManoByte's Network, or any network that the Company connects to,
(b) interferes with the supervisory or accounting functions of any system owned or managed by the company, or
(c) take action that is likely to have such effects. Such conduct includes, but is not limited to: hacking or spamming, placing of unlawful information on any computer system, transmitting data or programs likely to result in the loss of an individual’s work or result in system downtime, sending “chain letters” or “broadcast” messages to lists or individuals, or any other use that causes congestion of any networks or interferes with the work of others.
Users may not distribute or send unlawful communications of any kind, including but not limited to cyberstalking, threats of violence, obscenity, child pornography, or other illegal communications (as defined by law). This provision applies to any electronic communication distributed or sent within the company network or to other networks while using ManoByte's Network.
Users may not attempt to bypass network security mechanisms, including those present on the company network, without the prior express permission of the owner of that system. The unauthorized network scanning (e.g., vulnerabilities, port mapping, etc.) of the company network is also prohibited.
Users shall not send confidential data, including credit or debit cardholder data, unencrypted, via end-user messaging technologies such as e-mail, instant messaging, or chat without using an approved encryption solution. Where a solution is not available, the data shall not be sent via any of these methods. Nor shall users store confidential data, such as credit or debit cardholder data, on local hard drives or other external/mobile media.
Users may not engage in the unauthorized copying, distributing, altering, or translating of copyrighted materials for external purposes.
Users may not attempt to install any unauthorized or unlicensed software on company computing resources, including laptops, desktop PCs, servers, mobile devices, etc.
Users may not use the ManoByte's network for unlawful activities or uses that violate other company policies.
Users may not extend or share with the public or other users the ManoByte's Network beyond what has been configured accordingly by authorized personnel. Users are not permitted to connect any network devices or systems (e.g., switches, routers, wireless access points, VPNs, and firewalls) to the company Network without advance notice to and consultation with Information Services & Technologies.
Users are responsible for maintaining minimal security controls on their personal computer equipment that connects to the ManoByte's Network, including but not limited to current antivirus software, current system patches, and strong passwords.
Users may not violate any laws or ordinances, including, but not limited to, laws related to copyright, discrimination, harassment, threats of violence and/or export control.
Causing Security breaches or disruptions of communication over the ManoByte's ’ Network. Security breaches include, but are not limited to, accessing data or other communications of which the Authorized User is not an intended recipient or logging into an account that the Authorized User is not expressly authorized to access. For purposes of this section, "disruption" includes, but is not limited to, Network Sniffing, traffic floods, Packet Spoofing, Denial of Service, Denial of Attack, etc.
Users’ Expectations of Privacy & Personal Rights
All users of the company’s network and computing resources are expected to respect the privacy and personal rights of others.
Be professional and respectful when using computing systems to communicate with others; the use of computing resources to libel, slander, or harass any other person is not allowed and could lead to legal action by those who are the recipient of these actions.
While the company does not generally monitor or limit the content of information transmitted on the company network, it reserves the right to access and review such professional information under certain conditions. These include: investigating performance deviations and system problems (with reasonable cause), determining if an individual is in violation of this policy, or, as may be necessary, ensuring that ManoByte is not subject to claims of misconduct.