1. Introduction
1.1 - This Acceptable Use Policy (AUP) for IT Systems is designed to protect McCorvey Companies, our employees,
customers and other partners from harm caused by the misuse of our IT systems and our data. Misuse includes both
deliberate and inadvertent actions.
1.2 - The repercussions of misuse of our systems can be severe. Potential damage includes, but is not limited to,
malware infection (e.g. computer viruses), legal and financial penalties for data leakage, and lost productivity
resulting from network downtime.
1.3 - Everyone who works at McCorvey Companies is responsible for the security of our IT systems and the data on
them. As such, all employees must ensure they adhere to the guidelines in this policy at all times. Should any
employee be unclear on the policy or how it impacts their role they should speak to their manager or IT.
2. Definitions
2.1 - Users are everyone who has access to any of McCorvey Companies' IT systems. This includes
permanent employees and also temporary employees, contractors, agencies, consultants, suppliers, customers and
business partners.
2.2 - Systems means all IT equipment that connects to the corporate network, accesses corporate
applications or is owned by McCorvey Companies. This includes, but is not limited to, desktop computers, laptops,
smartphones, tablets, printers, data and voice networks, networked devices, software, electronically-stored data,
portable data storage devices, third party networking services, telephone handsets, video conferencing systems,
and all other similar items commonly understood to be covered by this term.
3. Scope
3.1 - This is a universal policy that applies to all Users and all Systems. For some Users and/or some Systems a
more specific policy exists: in such cases the more specific policy has precedence in areas where they conflict,
but otherwise both policies apply on all other points.
3.2 - This policy covers only internal use of McCorvey Companies’ systems, and does not cover use of our products
or services by customers or other third parties.
4. Use of IT Systems
4.1 - Users have no expectation of privacy when using a McCorvey Companies System or Software as a Service
(SaaS) application. All activity can be actively monitored, reviewed, or audited at any time without users
consent or notification.
4.2 - McCorvey Companies’ systems exist to support and enable the business. A small amount of personal use is,
in most cases, allowed. However, it must not be in any way detrimental to users own or their colleagues
productivity and nor should it result in any direct costs being borne by McCorvey Companies other than for
trivial amounts (e.g., an occasional short telephone call).
4.3 - McCorvey Companies trusts employees to be fair and sensible when judging what constitutes an acceptable
level of personal use of the company’s IT systems. If employees are uncertain, they should consult their
manager.
4.4 - Any information that is particularly sensitive or vulnerable must be encrypted and/or securely stored so
that unauthorized access is prevented (or at least made extremely difficult). However, this must be done in a
way that does not prevent–or risk preventing–legitimate access by all properly-authorized parties.
4.5 - Controlling the security, availability, and financial impact of all IT systems is solely the
responsibility of the IT manager. Any new software or system must be evaluated, approved, and purchased by an IT
manager.
4.6 - McCorvey Companies can monitor the use of its IT systems and the data on it at any time. This may include
examination of the content stored within the email and data files of any user, and examination of the access
history of any users.
5. Data Security
5.1 - Users must take all necessary steps to prevent unauthorized access to confidential information.
5.2 - Users are expected to assume all data on company systems is confidential.
5.3 - Users must not send, upload, remove on portable media or otherwise transfer to a non-McCorvey Companies
system any information that is designated as confidential, or that they should reasonably regard as being
confidential to McCorvey Companies, except where explicitly authorized to do so in the performance of their
regular duties.
5.4 - Users may have access to information that they are not authorized to view, use, or transmit. All users
must seek explicit written permission to view, use, or transmit any information stored on any computer systems.
6. Unacceptable Use
6.1 - All employees should use their own judgment regarding what is unacceptable use of McCorvey Companies’ systems. The activities below are provided as examples of unacceptable use, however it is not exhaustive. Should an employee need to contravene these guidelines in order to perform their role, they should consult with and obtain approval from an IT manager before proceeding.
7. Enforcement
7.1 - McCorvey Companies will not tolerate any misuse of its systems and will discipline anyone found to have
contravened the policy, including not exercising reasonable judgment regarding acceptable use. While each
situation will be judged on a case-by-case basis, employees should be aware that consequences may include the
termination of their employment.
7.2 - Use of any of McCorvey Companies’ resources for any illegal activity will usually be grounds for summary
dismissal, and McCorvey Companies will not hesitate to cooperate with any criminal investigation and prosecution
that may result from such activity.