Purpose
The Acceptable Use Policy (AUP) establishes guidelines for the appropriate use of the company’s IT resources, including hardware, software, network, and data systems. This policy ensures that all users understand their responsibilities in maintaining security, privacy, and efficiency in their use of company resources.
Scope
This policy applies to all employees, contractors (1099), consultants, temporary staff, and other workers at the company, including all personnel affiliated with third parties who access company IT resources.
Policy
1. Authorized Use
Markon systems are to be used for authorized purposes only and may grant access to sensitive and protected information, including but not limited to FCI, CUI, CDI, or CTI. Distribution of any such information is only permitted through adherence to established protocols. Sensitive information may only be shared with authorized recipients. Sensitive information may only be shared with authorized recipients.
2. Accountability
Users are responsible for the security of the accounts issued to them. Passwords must not be shared with others, and accounts should be locked or logged of when not in use.
3. Network Usage
Employees must not use the company’s internet or network services to engage in activities that are illegal, unethical, or violate company policies. This includes accessing inappropriate websites, downloading unauthorized software, and using bandwidth excessively for non-work-related activities.
4. Email and Communication Tools
Employees are expected to use email, messaging, and collaboration tools provided by the company in a professional manner. Personal or inappropriate use of these tools is prohibited, and all communications should align with company standards and guidelines.
5. Prohibited Actions:
-
Installing or using unauthorized software or hardware
-
Accessing, creating, or distributing content that is offensive, defamatory, or harassing
-
Sharing confidential company data without authorization
-
Engaging in illegal or unethical activities, including hacking, data theft, or unauthorized access to systems
6. Monitoring and Consent
By accessing any system at Markon, users acknowledge and agree that there is no expectation of privacy, either explicit or implicit. All usage of these systems and any data stored or transmitted within them may be intercepted, monitored, recorded, copied, audited, inspected, and disclosed to authorized compliance and law enforcement personnel, as well as authorized officials of other agencies. Unauthorized or improper use of Markon systems may result in administrative disciplinary action and civil and criminal penalties. Use of these systems indicates awareness of and consent to these terms and conditions of use.
7. Data Maintenance
Users are required to update and maintain any data requested of them in our Corporate Directory and Talent Pool systems. Ensuring accuracy and currency of information in these systems is essential for organizational efficiency and compliance.
Markon systems are to be used for authorized purposes only and may grant access to sensitive and protected information, including but not limited to FCI, CUI, CDI, or CTI. Distribution of any such information is only permitted through adherence to established protocols. Sensitive information may only be shared with authorized recipients. By accessing any system at Markon, users acknowledge and agree that there is no expectation of privacy, either explicit or implicit. All usage of these systems and any data stored or transmitted within them may be intercepted, monitored, recorded, copied, audited, inspected, and disclosed to authorized compliance and law enforcement personnel, as well as authorized officials of other agencies. Unauthorized or improper use of Markon systems may result in administrative disciplinary action and civil and criminal penalties. Use of these systems indicates awareness of and consent to these terms and conditions of use.