An I.T policy for the XYZ Company
1. Reasons for having this policy
All XYZ’s IT facilities and information resources remain the property of XYZ and not of particular individuals, teams or departments . By following this policy we'll help ensure IT facilities are used:
- legally;
- securely;
- without undermining XYZ;
- effectively;
- in a spirit of co-operation, trust and consideration for others;
- so they remain available.
The policy relates to all Information Technology facilities and services provided by XYZ. All staff and volunteers are expected to adhere to it.
2. Precautionary and Disciplinary Measures
Deliberate and serious breach of the policy statements in this section will lead to disciplinary measures which may include the offender being denied access to computing facilities.
2.1 Copyright:
Take care to use software legally in accordance with both the letter and spirit of relevant licensing and copyright agreements.
Copying software for use outside these agreements is illegal and may result in criminal charges.
2.2 Security:
i) Don't attempt to gain unauthorized access to information or facilities. The Computer Misuse Act 1990 makes it a criminal offence to obtain unauthorized access to any computer (including workstations and PCs) or to modify its contents. If you don't have access to information resources you feel you need, contact your IT Support person or provider.
ii) Don't disclose personal system passwords or other security details to other staff, volunteers or external agents and don't use anyone else's login; this compromises the security of XYZ. If someone else gets to know your password, ensure you change it or get IT Support to help you.
iii) If you leave your PC unattended without logging off, you are responsible for any misuse of it while you're away.
iv) ALWAYS check floppy disks for viruses, even if you think they are clean (contact IT Support to find out how). Computer viruses are capable of destroying XYZ’s information resources. It is better to be safe than sorry.