User:Goldenweek

Acceptable Use Policy Internet access has been given to employees of this foundation for the strict use of resource and interconnectivity, project management and supervision. Users are prohibited from accessing resources on restricted networks or internet resources. Violators will be dismissed of their duties within the group or organization pending an investigation as to the relation of applicable employees to the company. The organisation reserves the right to record this penalty as evidence and record keeping.

Monitoring and Privacy Policy

All network resources are the property of the foundation; all property is managed and monitored by management or applicable supervisors. The purpose of this policy is to define an effective regime of managing resources and restricting access to prohibited resources that have been deemed unproductive, illegal or contradictive to company directives.

Remote Access Policy

Remote Access to company resources is allowed and available only to database administrators and employees participating in projects abroad. Users are not permitted give login credentials to others. Confidential information or the intelligent property of the company must not be transmitted over an insecure connection. Employees are encouraged to use a physical storage medium as opposed to vulnerable net transmissions.

Network Connectivity Policy

Any network that has not been installed by a corporate official is deemed a private network. Any networks within the properties of the company are strictly the property of the company. Any individual private network must be logged and approved by a management official stating the cause, purpose, security and hours of usage. The usage of the network must comply with the Acceptable Use Policy, Monitoring policy, Remote access policy and Log Retention Policy. Private networks are the complete responsibility of the creators of the network and must assume full responsibilities and liability for the network. Log Retention Policy All activities on individual computers and networks will be logged and recorded. Logs and records will be backed up using access logs and auditing. These logs will be kept for duration of 3 years. The company reserves the right to use these access logs for future legal evidence if necessary.

Log Retention Policy

All activities on individual computers and networks will be logged and recorded. Logs and records will be backed up using access logs and auditing. These logs will be kept for duration of 3 years. The company reserves the right to use these access logs for future legal evidence if necessary.