Uzbekistan ln employee Handbook February 2020 Local National
Download 243.52 Kb. Pdf ko'rish
|
Uzbekistan Employee Handbook-PDF
Rules of Behavior
All data in the system may be intercepted, monitored, recorded, copied, audited and inspected. Users should have no expectation of privacy in this regard. Users’ right to privacy, if any, is superseded by RTI’s requirement to protect the integrity of Resources. Only users with credentials are authorized to access data or use Resources. Failure to comply with the terms and conditions of this policy may result in disciplinary action up to and including termination. Users are expected to abide with the following rules: • Users will not use credentials other than those issued to them. • User passwords may not be shared. Security: • Users may only use Resources for which they are authorized. • Users must protect the access and integrity of Resources. • Users will not attempt to circumvent security systems on Resources, including storing or running programs to obtain others’ passwords. • Users will not develop, obtain or use programs that harass others or that damage Resources. • Users may not store or execute programs or engage in or abet any activities designed to test or compromise system or network performance without prior authorization from the Chief Information Officer (CIO). • Users may not falsely represent themselves, others or Resources. Examples include, but are not limited to, “spoofing” e-mail or network addresses. Usage: • Users will not inspect, alter, delete, obtain copies of, publish, transmit, or otherwise tamper with data for which the user is not authorized. • Users are expected to use Resources in a productive manner and are responsible for the content of data that they transmit, store or display. Uzbekistan LN Employee Handbook February 2020 11 • Users may not use Resources for any purpose that is illegal or against RTI policy or contrary to RTI’s bests interests. Examples include, but are not limited to, sending e-mail espousing personal political views or religious beliefs, or for the purpose of advertising or soliciting for fundraisers. • Users must use Resources as intended for institutional purposes and not for private gain. • Users will not use Resources to send fraudulent, harassing or obscene messages. • Users may not engage in the transmission of unsolicited bulk e-mail (“spamming”) or electronic chain letters. Compliance: • Users should use Resources in compliance with applicable laws, regulations and licensing agreements. • Users must never access or use proprietary information for personal use, gain or interests. • The use of personal “disclaimers” in electronic messages may not be used in an attempt to absolve RTI from association with the content of messages; RTI assumes no responsibility for the content of electronic messages sent or received. RTI employees will be held responsible for the content of all messages sent by them using RTI-provided IT systems. Download 243.52 Kb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling