Table of Contents
The purpose of this policy is to establish acceptable
and unacceptable use of electronic devices and network resources at MTAG
Services, LLC in conjunction with its established culture of ethical and lawful
behavior, openness, trust, and integrity.
MTAG Services, LLC provides computer devices,
networks, and other electronic information systems to meet missions, goals, and
initiatives and must manage them responsibly to maintain the confidentiality,
integrity, and availability of its information assets. This policy requires the
users of information assets to comply with company policies and protects the
company against damaging legal issues.
employees, contractors, consultants, temporary and other workers at MTAG
Services, LLC, including all personnel
affiliated with third parties must adhere to this policy. This policy applies
to information assets owned or leased by MTAG Services, LLC, or to
devices that connect to a MTAG Services, LLC network or reside at a MTAG
Services, LLC site.
Information Security must approve exceptions to this
policy in advance through InformationSecurity@MTAGServices.com.
You are responsible for exercising good judgment
regarding appropriate use of MTAG Services, LLC resources in accordance with
MTAG Services, LLC policies, standards, and guidelines. MTAG Services, LLC
resources may not be used for any unlawful or prohibited purpose.
For security, compliance, and maintenance
purposes, authorized personnel may monitor and audit equipment, systems, and
network traffic per the Audit Policy. Devices that interfere with other devices
or users on the MTAG Services, LLC network may be disconnected. Information
Security prohibits actively blocking authorized audit scans. Firewalls and
other blocking technologies must permit access to the scan sources.
You are responsible for the security of data,
accounts, and systems under your control. Keep passwords secure and do not
share account or password information with anyone, including other personnel,
family, or friends. Providing access to another individual, either deliberately
or through failure to secure its access, is a violation of this policy.
You must ensure through legal or technical means
that proprietary information remains within the control of MTAG Services, LLC
at all times. Conducting MTAG Services, LLC business that results in the
storage of proprietary information on personal or non- MTAG Services, LLC
controlled environments, including devices maintained by a third party with
whom MTAG Services, LLC does not have a contractual agreement, is prohibited.
This specifically prohibits the use of an e-mail account that is not provided
by MTAG Services, LLC, or its customer and partners, for company business.
You are responsible for ensuring the protection
of assigned MTAG Services, LLC assets that includes the use of computer cable
locks and other security devices. Laptops left at MTAG Services, LLC overnight
must be properly secured or placed in a locked drawer or cabinet. Promptly
report any theft of MTAG Services, LLC assets to ITSecurity@MTAGServices.com.
All PCs, PDAs, laptops, and workstations must be
secured with a password-protected screensaver with the automatic activation
feature set to 10 minutes or less. You must lock the screen or log off when the
device is unattended.
Devices that connect to the MTAG Services, LLC
network must comply with the Minimum Access Policy.
Do not interfere with corporate device
management or security system software, including, but not limited to,
antivirus, internet appliance, firewall, etc.
You are responsible for the security and appropriate
use of MTAG Services, LLC network resources under your control. Using MTAG
Services, LLC resources for the following is strictly prohibited:
Causing a security breach to either MTAG
Services, LLC or other network resources, including, but not limited to,
accessing data, servers, or accounts to which you are not authorized;
circumventing user authentication on any device; or sniffing network traffic.
Causing a disruption of service to either MTAG
Services, LLC or other network resources, including, but not limited to, ICMP
floods, packet spoofing, denial of service, heap or buffer overflows, and
forged routing information for malicious purposes.
Introducing honeypots, honeynets, or similar
technology on the MTAG Services, LLC network.
Violating copyright law, including, but not
limited to, illegally duplicating or transmitting copyrighted pictures, music,
video, and software.
Exporting or importing software, technical
information, encryption software, or technology in violation of international
or regional export control laws.
Use of the Internet or MTAG Services, LLC
network that violates the MTAG Services, LLC policies, or local laws.
Intentionally introducing malicious code,
including, but not limited to, viruses, worms, Trojan horses, e-mail bombs,
spyware, adware, and key loggers.
Port scanning or security scanning on a
production network unless authorized in advance by Information Security.
The following are strictly prohibited:
Inappropriate use of communication vehicles and
equipment, including, but not limited to, supporting illegal activities, and
procuring or transmitting material that violates MTAG Services, LLC policies
against harassment or the safeguarding of confidential or proprietary
Sending Spam via e-mail, text messages, pages,
instant messages, voice mail, or other forms of electronic communication.
Forging, misrepresenting, obscuring,
suppressing, or replacing a user identity on any electronic communication to
mislead the recipient about the sender.
Posting the same or similar non-business-related
messages to large numbers of Usenet newsgroups (newsgroup spam).
Use of a MTAG Services, LLC e-mail or IP address
to engage in conduct that violates MTAG Services, LLC policies or guidelines.
Posting to a public newsgroup, bulletin board, or listserv with a MTAG
Services, LLC e-mail or IP address represents MTAG Services, LLC to the public;
therefore, you must exercise good judgment to avoid misrepresenting or
exceeding your authority in representing the opinion of the company.
non-employees found to have violated this policy may be subject to civil
charges/criminal penalties, and/or other sanctions,
found to have violated this policy may be subject to disciplinary action, up to
and including termination of employment. A violation of this policy by a
temporary worker, contractor or vendor may result in the termination of their
contract or assignment with MTAG Services, LLC.