Our company relies on technology to conduct business with our customers every day. The technologies we use are based on our and our customers' information (data). This document serves to describe the acceptable use of such technologies and information and also to detail how we can protect such critical elements. Failure to act responsibly and ethically could jeopardize our equipment, our employees, our business and our customers. The rules outlined in this document must apply to every single employee in the organization. We are a team and we must all commit to using company systems, networks and peripherals responsibly. Furthermore, because our business depends on the loyalty and trust of our customers, we must all value and preserve the personal data they entrust to us. By holding each employee to a high standard, we not only protect ourselves from complications, but also strengthen the positive impression and reputation of our company. To provide comprehensive data and infrastructure protection, we must use a system that emphasizes tangib...
tags