Information technology continues to expand in use and importance throughout all aspects of life and A Technology Company (ATC). It is an indispensable tool for education, and research and plays a central role in the overall life of ATC.
PURPOSE:
The uses of information technology have changed dramatically over the last twenty years, and it is likely that the rate of change will accelerate in the future. For these reasons, it is critical that A Technology Company articulate a clear statement regarding the appropriate uses of our information technology resources and institute safeguards to ensure that our technology is secure, reliable, and available for the all employees of ATC.
SCOPE:
This document will cover the acceptable use of all IT resources on the ATC network in compliance with DoD Standards and Compliance Laws. This policy will be in effect for all employees of ATC, including but not limited to; Contractors, Vendors & any person with access to ANY ATC IT resource.
ACCEPTABLE USE POLICY:
By signing this policy you acknowledge and consent that when you access ANY ATC IT Resource:
1. I will use ATC IT Resources (computers, systems, and networks) only for authorized purposes.
2. I will not try to access data or use operating systems or programs, except as specifically authorized.
3. I know I will be issued a user identifier (user ID) and a password to authenticate my ATC.com account. After receiving them—
a. I will not allow anyone else to have or use my password. If I know that my password is compromised, I will report to my ATC Information System Security (ISS) Team for a new one.
4. I will not run “sniffers” (utilities used to monitor network traffic, commonly used to Spy on other network users and attempt to collect their passwords) or any hacker-related software on my IT system, or network.
5. If I observe anything on the system I am using that indicates inadequate