2
expectation of, privacy with respect to their use of Company Technology, subject to applicable
laws.
Notwithstanding the above, any use of the Company Technology must be in accordance with
the provisions set out within this Policy. If a User requires additional clarification about the
appropriate use of Company Technology, they should contact their manager.
(b) Unacceptable Use
The relationship between the Company and its Users is based on trust. This trust must be
maintained at all times as it is fundamental to the employment relationship. Users must, at all
times, hold themselves to the highest standards of conduct so as to maintain the Company's
reputation and the integrity of the Company's business.
Users shall not be permitted to use any of the Company Technology to:
solicit or recruit for any non-job-related commercial ventures, religious or political
causes, outside organizations or other non-job-related solicitations;
store, access, transfer, download, upload, communicate or create any fraudulent,
harassing, embarrassing, sexually explicit, profane, obscene, intimidating, libelous,
slanderous, threatening, abusive, defamatory, or otherwise unlawful or inappropriate
materials;
download entertainment software or games, or to play games over the Internet;
access Internet sites for gambling or any illegal activity;
embarrass Company executives, or to jeopardize the Company’s reputation;
download, store or transmit material that infringe any copyright, trademark or other
proprietary right;
post or transmit proprietary or confidential information related to clients, suppliers,
vendors, allied parties, or other third parties;
post or store Company business-related information on public storage sites;
download or distribute pirated software or data;
deliberately propagate a virus, malware, or any other malicious program code;
send confidential Company information without prior authorization from the proper
authoritative manager. Such confidential information includes, but is not limited to,
Company copyrighted materials, trade secrets, intellectual property, proprietary
financial information, employee information, customer information, or other similar
materials that would be considered confidential in nature (“Confidential Information”);
access, use or disclose Confidential Information without authority;
engage in activities for personal gain or a personal business, or for any commercial or
business purposes other than Company purposes;
perform any scanning or information gathering regarding Company Technology,
including the following: port scanning, security scanning, network sniffing, keystroke