An I.T policy for the XYZ Company

1. Reasons for having this policy

All XYZ’s IT facilities and information resources remain the property of  XYZ and not of particular individuals, teams or departments . By following this policy we'll help ensure IT facilities are used:
- legally;
- securely;
- without undermining XYZ;
- effectively;
- in a spirit of co-operation, trust and consideration for others;
- so they remain available.

The policy relates to all Information Technology facilities and services provided by XYZ. All staff and volunteers are expected to adhere to it.

2. Precautionary and Disciplinary Measures

Deliberate and serious breach of the policy statements in this section will lead to disciplinary measures which may include the offender being denied access to computing facilities.

2.1 Copyright:
Take care to use software legally in accordance with both the letter and spirit of relevant licensing and copyright agreements.
Copying software for use outside these agreements is illegal and may result in criminal charges.

2.2 Security:
 i) Don't attempt to gain unauthorized access to information or facilities. The Computer Misuse Act 1990 makes it a criminal offence to obtain unauthorized access to any computer (including workstations and PCs) or to modify its contents. If you don't have access to information resources you feel you need, contact your IT Support person or provider.
ii) Don't disclose personal system passwords or other security details to other staff, volunteers or external agents and don't use anyone else's login; this compromises the security of XYZ. If someone else gets to know your password, ensure you change it or get IT Support to help you.
iii)  If you leave your PC unattended without logging off, you are responsible for any misuse of it while you're away.
iv) ALWAYS check floppy disks for viruses, even if you think they are clean (contact IT Support to find out how). Computer viruses are capable of destroying XYZ’s information resources. It is better to be safe than sorry.

Join now!

2.3 Information about people:         

If you're recording or obtaining information about individuals make sure you are not breaking Data Protection legislation (your IT Manager or Line Manager can give you more information).

2.4 You are a representative of XYZ when you're on the Internet using email:
i) Make sure your actions are in the interest (and spirit) of  XYZ and don't leave XYZ open to legal action (e.g. libel).
ii) Avoid trading insults with other people using the Internet with whom you disagree.
ii) Obscenities/Pornography: Don't write it, publish it, look for it, bookmark it, access it or download it.

2.5 'Electronic ...

This is a preview of the whole essay