Professional Documents
Culture Documents
Please fill out all fields as appropriate, and return form to the Information Technology Department for further processing and handling. Some
network access rights require additional approval from Management, or Human Resources. You will be advised of any access not provided,
and the declining party. Incomplete forms will be returned for completion.
2.
3.
4.
5.
6.
7.
8.
9.
All [SHORT NAME] computing resources are for lawful and authorized business use only. All information that is generated,
documented and/or communicated using [SHORT NAME] computer resources is [SHORT NAME]'s property. [SHORT NAME]
reserves the right to monitor, inspect, review, restrict or retain any computing resources, activities, or records on, or accessed
via [SHORT NAME] computer resources.
Users are to engage in business appropriate conduct. Fraudulent, defamatory, threatening, harassing or obscene messages
and/or materials shall not be sent from, to, or stored on [SHORT NAME] systems.
Users are not to transmit, distribute, copy, or store data in violation of any applicable law, regulation, or client agreement. This
includes, without limitation, material protected by government controls, copyright, trademark, trade secret, proprietary
information, or other intellectual property right without documented permission from the owner on file with IT and HR.
[SHORT NAME] provides all appropriate hardware for usage by users. Usage of non-company hardware, including laptops,
smartphones, USB flash drives or other media, connecting to company resources is to be approved in writing by Information
Technology and non-company hardware will not be supported by [SHORT NAME] IT.
Access to any [SHORT NAME] internal or external resources are exclusively for use in the performance of [SHORT NAME]
business. Users shall not share their [SHORT NAME] internal or external account(s) and/or password(s), with anyone other
than Information Technology, or an officer of the company without written authorization on file with Information Technology and
Human Resources. This includes, but is not limited to sharing the password to an account, providing access by entering a
password for others to use, using incremental passwords, or utilizing any other manual or automated password delivery
mechanism (printed forms, Post-it Notes, Roboform, PasswordManager, etc).
Users shall not purposely engage in activity with the intent to: degrade the performance of systems; deprive an authorized
[SHORT NAME] user access to a [SHORT NAME] internal or external resource; obtain extra resources beyond those
allocated; circumvent [SHORT NAME] computer security measures or gain access to a [SHORT NAME] internal or external
resource for which proper authorization has not been given.
Users shall not utilize computers for personal use, except standard items as permitted during designated breaks and
lunchtimes or as defined by management.
Users shall refer any requests for specific internal information regarding [SHORT NAME] Information Technology and security
practices to Information Technology.
Users are required to report any weaknesses in [SHORT NAME] computer security, any incidents of possible misuse or
violation of this user agreement to Information Technology, including, but not limited to data leaks, exposed or shared
passwords, etc.
Any noncompliance with these standards will constitute a security violation and may result in disciplinary action, including termination.
Violations of some of these standards may result in civil or criminal investigations and/or prosecution. More detailed information can be
found in Policy XXX XXXXXXXXXXX (if you have another policy)
Complete the form with all known information, and submit the form to Information Technology for review and
processing. If needed, request assistance in filling out the form.
Reviews and validates the requested access, technical details, and implications of access, then forwards
the form to H.R. for final approval. Additional parties may be consulted to verify appropriate request.
Reviews I.T. actions, confirms approved access, and returns to I.T. for processing.
Creates, modifies, or deletes account as per request (and modifications), updates requestor on status of
approvals or denials of access, and tests account as appropriate.
Information Technology retains original on-file and provides a copy to HR for personnel folder. Contracts
Administrator will keep an additional copy in Docuware.
[COMPANY NAME]
Please fill out all fields as appropriate, and return form to the Information Technology Department for further processing and handling. Some
network access rights require additional approval from Management, or Human Resources. You will be advised of any access not provided,
and the declining party. Incomplete forms will be returned for completion.
I have received a copy of, read, and understand the [SHORT NAME] Information Technology Acceptable Use Statement for [SHORT NAME] Computing
Resources, and agree to abide by these statements. I will notify [SHORT NAME] Information Technology immediately upon violation of any of these statements
for proper security handling.
Name of User (Please Print): ________________________________________________________________________________
Signature of User: ________________________________________________________________________________ Date:___________________________