This IT and Mobile Acceptable Use Policy outlines the guidelines and responsibilities for the appropriate use of information technology (IT) resources and mobile devices provided by Benchmark Group of Companies. These resources are essential for conducting business efficiently and securely. It is important for all employees to adhere to this policy to maintain the integrity, confidentiality, and availability of company data and systems.
This policy applies to all employees, contractors, consultants, temporary workers, and other personnel who have access to [Company Name]'s IT resources and mobile devices.
a. IT resources and mobile devices provided by Benchmark Group of Companies are to be used for business purposes only.
b. Personal use of IT resources and mobile devices should be limited to non-work hours and should not interfere with job duties.
a. Protect sensitive company data by following established security protocols, including the use of strong passwords, encryption where applicable, and adherence to data classification policies.
b. Do not share company passwords or access credentials with unauthorized individuals.
c. Report any suspected security breaches or unauthorized access to IT resources or mobile devices immediately to the IT department.
a. Only install authorized software and applications approved by the IT department on company-owned devices.
b. Do not download or install unauthorized software or applications that may pose security risks or violate licensing agreements.
a. Use the company's internet connection and email system responsibly and in accordance with company policies.
b. Refrain from accessing or distributing offensive, obscene, or inappropriate content via company IT resources or email accounts.
c. Exercise caution when accessing external websites or opening email attachments to prevent malware infections and security threats.
a. Secure mobile devices with passcodes or biometric authentication to prevent unauthorized access.
b. Enable device encryption and remote wipe functionality to protect company data in the event of loss or theft.
c. Report lost or stolen mobile devices to the IT department immediately.
a. Ensure compliance with all applicable laws, regulations, and industry standards related to IT and mobile device usage, including data protection and privacy laws.
b. Do not engage in any activities that violate copyright laws, intellectual property rights, or any other legal statutes.