Available Policies
last updated: 18 April 2023
Information Systems: All electronic means used to create, store, access, transmit, and use data, information, or communications in the conduct of administrative, instructional, research, or service activities.
Additionally, it is the procedures, equipment, facilities, software, and data that are designed, built, operated, and maintained to create, collect, record, process, store, retrieve, display, and transmit information.
Authorized User: An individual or automated application or process that is authorized access to the resource by the system owner, in accordance with the system owner’s procedures and rules.
Extranet: An intranet that is partially accessible to authorized persons outside of a company or organization.
Data, electronic file content, information systems, and computer systems at TeamKinetic must be managed as valuable organization resources.
Information Technology’s (IT) intentions are not to impose restrictions that are contrary to TeamKinetic’s established culture of openness, trust, and integrity. IT is committed to protecting TeamKinetic’s authorized users, partners, and the company from illegal or damaging actions by individuals either knowingly or unknowingly.
Internet/Intranet/Extranet-related systems, including, but not limited to, computer equipment, software, operating systems, storage media, network accounts providing electronic mail, WWW browsing, and File Transfer Protocol (FTP) are the property of TeamKinetic.
These systems are to be used for business purposes in serving the interests of TeamKinetic and of its clients and members during normal operations.
Effective security is a team effort involving the participation and support of every TeamKinetic employee, volunteer, and affiliate who deals with information and/or information systems.
It is the responsibility of every computer user to know these guidelines and to conduct activities accordingly.
Purpose
The purpose of this policy is to outline the acceptable use of computer equipment at TeamKinetic. These rules are in place to protect the authorized user and TeamKinetic. Inappropriate use exposes TeamKinetic to risks including virus attacks, compromise of network systems and services, and legal issues.
Scope
This policy applies to the use of information, electronic and computing devices, and network resources to conduct TeamKinetic business or interacts with internal networks and business systems, whether owned or leased by TeamKinetic, the employee, or a third party.
All employees, volunteer/directors, contractors, consultants, temporaries, and other workers at TeamKinetic, including all personnel affiliated with third parties, are responsible for exercising good judgment regarding appropriate use of information, electronic devices, and network resources in accordance with TeamKinetic policies and standards, local laws, and regulations.
Ownership of Electronic Files
All electronic files created, sent, received, or stored on TeamKinetic owned, leased, or administered equipment or otherwise under the custody and control of TeamKinetic are the property of TeamKinetic.
Privacy
Electronic files created, sent, received, or stored on TeamKinetic owned, leased, or administered equipment, or otherwise under the custody and control of TeamKinetic are not private and may be accessed by TeamKinetic IT employees at any time without knowledge of the user, sender, recipient, or owner.
Electronic file content may also be accessed by appropriate personnel in accordance with directives from Human Resources or the President/CEO.
Access requests must be authorized and submitted from departmental supervisors for employees to gain access to computer systems. Authorized users are accountable for all activity that takes place under their username.
Authorized users should be aware that the data and files they create on the corporate systems immediately become the property of TeamKinetic. Because of the need to protect TeamKinetic’s network, there is no guarantee of privacy or confidentiality of any information stored on any network device belonging to TeamKinetic.
For security and network maintenance purposes, authorized individuals within the TeamKinetic IT Department may monitor equipment, systems, and network traffic at any time.
TeamKinetic’s IT Department reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy.
TeamKinetic’s IT Department reserves the right to remove any non-business related software or files from any system.
Examples of non-business related software or files include, but are not limited to; games, instant messengers, pop email, music files, image files, freeware, and shareware.
Security and Proprietary Information
All mobile and computing devices that connect to the internal network must comply with this policy and the following policies:
System level and user level passwords must comply with the Password Policy. Authorized users must not share their TeamKinetic login ID(s), account(s), passwords, Personal Identification Numbers (PIN), Security Tokens (i.e. Smartcard), or similar information or devices used for identification and authentication purposes.
Providing access to another individual, either deliberately or through failure to secure its access, is prohibited.
Authorized users may access, use, or share TeamKinetic proprietary information only to the extent it is authorized and necessary to fulfill the users assigned job duties.
All PCs, laptops, and workstations should be secured with a password-protected screensaver with the automatic activation feature set at 10 minutes or less.
All users must lockdown their PCs, laptops, and workstations by locking (control-alt- delete) when the host will be unattended for any amount of time. Employees must log-off, or restart (but not shut down) their PC after their shift.
TeamKinetic proprietary information stored on electronic and computing devices, whether owned or leased by TeamKinetic, the employee, or a third party, remains the sole property of TeamKinetic. All proprietary information must be protected through legal or technical means.
All users are responsible for promptly reporting the theft, loss, or unauthorized disclosure of TeamKinetic proprietary information to their immediate supervisor and/or the IT Department.
All users must report any weaknesses in TeamKinetic computer security and any incidents of possible misuse or violation of this agreement to their immediate supervisor and/or the IT Department.
Users must not divulge dial-up or dial-back modem phone numbers to anyone without prior consent of the TeamKinetic IT Department.
Authorized users must use extreme caution when opening e-mail attachments received from unknown senders, which may contain viruses, e-mail bombs, or Trojan Horse codes.
Unacceptable Use
Users must not intentionally access, create, store, or transmit material which TeamKinetic may deem to be offensive, indecent, or obscene.
Under no circumstances is an employee, volunteer/director, contractor, consultant, or temporary employee of TeamKinetic authorized to engage in any activity that is illegal under local, state, federal, or international law while utilizing TeamKinetic-owned resources.
System and Network Activities
The following activities are prohibited by users, with no exceptions:
Access to the Internet at home, from a TeamKinetic-owned computer, must adhere to all the same policies that apply to use from within TeamKinetic facilities. Authorized users must not allow family members or other non-authorized users to access TeamKinetic computer systems.
TeamKinetic information systems must not be used for personal benefit.
Incidental Use
As a convenience to the TeamKinetic user community, incidental use of information systems is permitted. The following restrictions apply: