You are on page 1of 8

The Alpha Android Acceptable Use Policy

I. Overview:
The purpose of this policy is to allow the comprehension of the acceptable and unacceptable uses of network devices and resources, both mobile and not mobile, at The Alpha Android Company in concurrence with its established atmosphere of ethical and lawful behavior, openness, trust, and integrity. The Alpha Android Company supplies desktops, laptops, networks, tablets, mobile phones, and other electronic devices and systems to meet any and all goals, deadlines, and initiatives and must manage them responsibly to maintain the security, integrity, and openness of its informational assets. This policy states that the users of information assets comply with company policies and protect the company against any and all damaging legal issues in any way possible.

II. Scope:
All employees, recruiters, and other workers (part-time and temporary included) at The Alpha Android Company, including third party affiliated personnel must adhere to this policy. This policy applies to information assets owned or leased by The Alpha Android Internet

Provider Company, or to devices of any kind that establish a connection with an Alpha Android network or on the Alpha Android website. Information Security must allow exceptions to this policy at least 10 days prior to use of exception by requesting an exception by e-mail, exception request form, or in person.

III. Policy Statement:


3.1 General Requirements
3.1.1: You are responsible for having a habit of good judgment regarding the appropriate use of Alpha Android resources in harmony with The Alpha Android Company policies, standards, and guidelines. The Alpha Android Companys resources may not be used for any unlawful or unacceptable purpose (under this policy). 3.1.2: For security, conformance, and maintenance purposes, authorized personnel will be monitoring and may audit equipment, systems, and network interchange per the Audit Policy. Devices that create interference for other devices or users on the Alpha Android network can and will be disconnected from said network at any time. Information Security prohibits, in any way, blocking authorized audit scans. Firewalls and other blocking technologies must authorize access to the scan sources.

3.2 System Accounts:


3.2.1: You are Accountable for the confidentiality and security of data accounts, and systems under your control. Keep passwords secure and do not share account or password information with anyone, including other personnel, family, or friends. Providing access to another worker, in any case, is a violation of this policy and is punishable by being removed from service. 3.2.2: You must have system-level and user-level passwords in agreement with the Password Policy. 3.2.3: You are required to ensure through legal or technical means that proprietary information remains within the control of The Alpha Android Company at all times. Executing Alpha Android Company business that results in the storage of proprietary information on a home, personal, or non-Alpha Android controlled device or environment, including devices maintained by a third party with which The Alpha Android Company does not have a contractual agreement is prohibited. This especially prohibits the use of an e-mail account that is not provided by The Alpha Android Company, customers, or partners for company business.

3.3 Computing Assets:


3.3.1: You are to ensure the protection of designated Alpha Android devices and assets, including the use of computer cable locks and other security devices. Laptops and other devices left at The Alpha Android Company overnight must be correctly secured or placed in a locked drawer or cabinet. Immediately report any theft of Alpha Android Company to your supervisor or superior in the office building you work in.

3.3.2: All Personal Computers, Personal Digital Assistants, Laptops, mobile devices, and workstations must be secured with a password protected screensaver with the automatic activation feature set to 5 minutes or less. You must lock the screen or log off when the device is unattended (if on lunch break, lock the device). 3.3.3 Devices that connect to The Alpha Android network must follow the Minimum Access Policy. 3.3.4 Do not attempt to disrupt, interfere with, or turn off the corporate device management, security systems, or any company software, including, but not limited to, antivirus, Windows Firewall, Ironclad, McAfee, and BlackBerry Enterprise Service.

3.4 Network Use


You are held accountable for the security and appropriate use of Alpha Android Company resources under your control. Using Alpha Android Company resources for any of the following is strictly prohibited: 3.4.1: Causing a security breach of any company, network, or device, including, but not limited to, data, servers, or accounts to which you are not authorized; circumventing user authentication on any device, or sniffing network traffic. 3.4.2: Causing a disruption of service to either The Alpha Android Company, other networks, or other devices of any sort, including, but not limited to, ICMP floods, packet spoofing, denial of service, heap or buffer overflows, and forged routing information for malicious purposes. 3.4.3: Introducing Honeypots, Honeynets, or similar technology to any network.

3.4.4: Breaking Copyright law, including, but not limited to, illegally duplicating or transmitting copyrighted pictures, music, video, or software. See the page http://www.copyright.gov/title17/. 3.4.5: Exporting or importing software, technical information, encryption (data hiding) software, or technology in violation of international or regional export control laws. See http://www.bis.doc.gov/index.php/regulations#ear 3.4.6: Use of the Internet or The Alpha Android Company network or any other networks that violate the Internet Security Policy, other Alpha Android Company policies, or local laws. 3.4.7: Intentionally entering, introducing, or activating malicious code to/on The Alpha Android Company networks, including, but not limited to, viruses, worms, Trojan Horses, e-mail bombs, spyware, adware, and keyloggers. 3.4.8: Port Scanning or Security scanning on a production network unless authorized in advance by the Information Security Department.

3.5 Electronic Communications:


The following actions are especially prohibited: 3.5.1: Inappropriate use of communication technologies, vehicles, and equipment of any kind; including but not limited to: i. ii. Supporting illegal behavior, actions, tricks, or activities of any kind Procuring or transmitting material that violates Alpha Android policies against the harassment or the safekeeping of confidential, undisclosed, or proprietary information.

3.5.2: Sending spam via any method of communication

3.5.3: Forging, misrepresenting, obscuring, suppressing, replacing, or use any other form of disinformation to mislead the recipient about the sender 3.5.4: Committing newsgroup spam 3.5.5: Use of an Alpha Android Company e-mail, IP address, or network to engage in conduct that violates Alpha Android Company policies, guidelines, or any local laws. Posting to a public or private discussion, chat room, or LISTSERV with an Alpha Android Company e-mail, IP address, or network representing The Alpha Android Company to the public; therefore, you are entitled to exercise good judgment to avoid misrepresenting/exceeding your authority in representing the opinion of the company.

IV. References
http://www.bis.doc.gov/index.php/regulations#ear http://www.copyright.gov/title17/

V. Enforcement
An employee found to have violated this policy may be subject to penalizing/disciplinary action up to and including the firing of said offender. A violation of this policy by a temporary worker, contractor, or vendor may result in the termination of said workers, contractors, or vendors contract/assignment with The Alpha Android Company.

VI. Definitions
Honeypot/Honeynet Network decoys that serve to distract attackers from valuable machines on a network. The decoys provide an early warning for intrusion protection and detailed information on vulnerabilities. Electronic junk mail or junk newsgroup postings. Messages that are unsolicited, unwanted, and/or irrelevant Personal Digital Assistant; an electronic device that stores and organizes information. Also known as Keystroke Logging, it is the action of recording the keys struck on a keyboard. Posting the same/similar nonbusiness-related messages to large numbers of Usenet Newsgroups A software program that transparently copies an e-mail and sends one of the copies per address to every address. a repository usually within the Usenet system, for messages posted from many users in different locations. Other names are: discussion group, forum, chat room, and social media website

Spam

PDA

Keyloggers

Newsgroup Spam

LISTSERV

Usenet Newsgroup

You might also like