Acceptable Use Policy

SOS Gamers Inc. Acceptable Use Policy

Author: Kwabena Ampofo

Date: 08 May 2016

Review History

Name

Department

Role/Position

Date approved

Signature

Kwabena Ampofo

Administration

President

08 May 2016

Kwabena Ampofo

Approval History

Name

Department

Role/Position

Date approved

Signature

Kwabena Ampofo

Administration

President

08 May 2016

Kwabena Ampofo

1 Overview

The purpose of this policy is to establish acceptable and unacceptable use of electronic devices and network resources at SOS Gamers Inc. in conjunction with its established culture of ethical and lawful behavior, openness, trust, and integrity.

SOS Gamers Inc. provides computer devices, networks, and other electronic information systems to meet missions, goals, and initiatives and must manage them responsibly to maintain the confidentiality, integrity, and availability of its information assets. This policy requires the users of information assets to comply with company policies and protects the company against damaging legal issues.

2 Scope

All employees, contractors, consultants, temporary and other workers at SOS Gamers Inc., including all personnel affiliated with third parties must adhere to this policy. This policy applies to information assets owned or leased by SOS Gamers Inc., or to devices that connect to a SOS Gamers Inc. network or reside at a SOS Gamers Inc. site.

3 Policy Statement

3.1 General Requirements

  1. 3.1.1  You are responsible for exercising good judgment regarding appropriate use of SOS Gamers Inc. resources in accordance with SOS Gamers Inc. policies, standards, and guidelines. SOS Gamers Inc. resources may not be used for any unlawful or prohibited purpose.
  2. 3.1.2  For security, compliance, and maintenance purposes, authorized personnel may monitor and audit equipment, systems, and network traffic per the Audit Policy. Devices that interfere with other devices or users on the SOS Gamers Inc. network may be disconnected. Information Security prohibits actively blocking authorized audit scans. Firewalls and other blocking technologies must permit access to the scan sources.

3.2 System Accounts

  1. 3.2.1  You are responsible for the security of data, accounts, and systems under your control. Keep passwords secure and do not share account or password information with anyone, including other personnel, family, or friends. Providing access to another individual, either deliberately or through failure to secure its access, is a violation of this policy.
  2. 3.2.2  You must maintain system-level and user-level passwords in accordance with the Password Policy.
  3. 3.2.3  You must ensure through legal or technical means that proprietary information remains within the control of SOS Gamers Inc. at all times. Conducting SOS Gamers Inc. business that results in the storage of proprietary information on personal or non-SOS Gamers Inc. controlled environments, including devices maintained by a third party with whom SOS Gamers Inc. does not have a contractual agreement, is prohibited. This specifically prohibits the use of an e-mail account that is not provided by SOS Gamers Inc., or its customer and partners, for company business.

3.3 Computing Assets

  1. 3.3.1  Devices that connect to the SOS Gamers Inc. network must comply with the Minimum Access Policy.
  2. 3.3.2  Do not interfere with corporate device management or security system software.

3.4 Network Use

You are responsible for the security and appropriate use of SOS Gamers Inc. network resources under your control. Using SOS Gamers Inc. resources for the following is strictly prohibited:

  1. 3.4.1  Causing a security breach to either SOS Gamers Inc. or other network resources, including, but not limited to, accessing data, servers, or accounts to which you are not authorized; circumventing user authentication on any device; or sniffing network traffic.
  2. 3.4.2  Causing a disruption of service to either SOS Gamers Inc. or other network resources, including, but not limited to, ICMP floods, packet spoofing, denial of service, heap or buffer overflows, and forged routing information for malicious purposes.
  3. 3.4.3  Violating copyright law, including, but not limited to, illegally duplicating or transmitting copyrighted pictures, music, video, and software.
  4. 3.4.4  Exporting or importing software, technical information, encryption software, or technology in violation of international or regional export control laws.
  5. 3.4.5  Use of the Internet or SOS Gamers Inc. network that violates SOS Gamers Inc. policies, or local laws.
  6. 3.4.6  Intentionally introducing malicious code, including, but not limited to, viruses, worms, Trojan horses, e-mail bombs, spyware, adware, and keyloggers.
  7. 3.4.7  Port scanning or security scanning on a production network unless authorized in advance by Information Security.

3.5 Electronic Communications

The following are strictly prohibited:

3.5.1  Inappropriate use of communication vehicles and equipment, including, but not limited to, supporting illegal activities, and procuring or transmitting material that violates SOS Gamers Inc. policies against harassment or the safeguarding of confidential or proprietary information.

  1. 3.5.2  Sending Spam via e-mail, text messages, pages, instant messages, voice mail, or other forms of electronic communication.
  2. 3.5.3  Forging, misrepresenting, obscuring, suppressing, or replacing a user identity on any electronic communication to mislead the recipient about the sender.
  3. 3.5.4  Posting the same or similar non-business-related messages to large numbers of Usenet newsgroups (newsgroup spam).
  4. 3.5.5  Use of a SOS Gamers Inc. e-mail or IP address to engage in conduct that violates SOS Gamers Inc. policies or guidelines. Posting to a public newsgroup, bulletin board, or listserv with a SOS Gamers Inc. e-mail or IP address represents SOS Gamers Inc. to the public; therefore, you must exercise good judgment to avoid misrepresenting or exceeding your authority in representing the opinion of the company.

4 Enforcement

An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. A violation of this policy by a temporary worker, contractor or vendor may result in the termination of their contract or assignment with SOS Gamers Inc..

5 Definitions

6 Revision History

Term

Definition

Spam

Electronic junk mail or junk newsgroup postings. Messages that are unsolicited, unwanted, and irrelevant.

Date of Change

Responsible

Summary of Change

08 May 2016

Kwabena Ampofo

Policy created