Information

  • Document No.

  • Audit Title

  • Client / Site

  • Conducted on

  • Prepared by

  • Location
  • Personnel

  • PRO-CLEAN INTERNATIONAL LTD. maintains certain policies with regard to the use and security of its computer systems, including the network. All users of these facilities are expected to be familiar with the policies and the consequences of violation as listed below.
    Computer facilities and infrastructure are provided for meeting the Company’s business goals and to provide access to local, national, and international facilities to aid in the achieving of those goals. Those using the facilities and services must respect the intellectual and access rights of others locally, nationally, and internationally. Staff should be aware that any use of the facilities or infrastructure that is in violation of the guidelines listed below may be considered an infraction and could lead to disciplinary action, including immediate dismissal.

Network Security


  • 1. Unauthorized attempts to gain privileged access or access to any account or computer not belonging to you on any Company computer or system are not permitted.
    2. Creation of any program, Web form, or other mechanism that asks for a Company user identity and password is prohibited.
    3. Computer and network accounts provide access to personal, confidential data. Therefore, individual accounts cannot be transferred to or used by another individual. Sharing accounts or passwords is not permitted.
    4. Each user is responsible for the proper use of his or her account and any activity conducted with it. This includes choosing safe passwords and protecting them.
    5. Each computer user is responsible for the security of any computer he/she connects to the network. A computer seen to be attacking other systems (e.g., having fallen victim to viruses/worms or similar) will be taken off the network, generally without notice, until it has been made secure. Knowingly running or installing on any computer system or network, or giving to another user, a program intended solely for the purpose of damaging or placing excessive load on a computer system or network is a violation of these rules. This includes, but is not limited to, computer viruses, Trojan horses, worms, bots, flash programs, or password-cracking programs.
    6. No Company computer, system, or network may be used as a vehicle to gain unauthorized access to other systems.
    7. Any user who finds a possible security lapse on any Company system must report it to the system administrator. To protect your files and the system, don’t attempt to use a computer under these conditions until the system administrator has investigated the problem.
    8. All users should be aware that the system administrator conducts periodic security checks of Company systems, including password checks. Any user found to have an easily guessed password will be required to choose a secure password during his or her next login process.
    9. User files on central Company systems are kept as private as possible. Attempts to read another person’s files will be treated with the utmost seriousness. The system administrator will not override file protections unless necessary in the course of his or her duties, and will treat the contents of those files as private information at all times.

  • I have read and understood introductory and the network security section

  • Initial

Computer Usage Policies

  • 10. No Company computer may be used for purposes that violate Company regulations, or for illegal or criminal purposes.
    11. Please keep in mind that many people use Company computers for daily work. Obstructing this work by consuming gratuitously large amounts of system resources (disk space, CPU time, print quotas, network bandwidth) or by deliberately crashing the machine(s) will not be tolerated. Please cooperate by running large jobs on shared systems at off-peak hours.
    12. Use of any Company computer by outside individuals or organizations requires special permission from the system administrator.
    13. Use of Company computers for commercial purposes other than those of the Company, except where explicitly approved, is strictly prohibited.
    14. No Company computer may be used for playing computer games.
    15. Copying, storing, displaying, or distributing copyrighted material using Company computers or networks without the express permission of the copyright owner, except as otherwise allowed under the copyright law, is prohibited.
    16. Copying, storing, displaying, or distributing pornographic material using Company computers is prohibited. This prohibition extends to using Company computers to view Web sites displaying such material.

  • I have read and understood the Computer Usage Policies section

  • Initial

Internet Access

  • 17. Internet access is provided to staff to enable them to undertake Company business. Use of the Internet for personal reasons should be of limited and infrequent duration, and this privilege may be withdrawn if such use is considered excessive.
    18. The Company reserves the right to block user access to specific Web sites, or groups of Web sites, without notice to staff.
    19. While the Company respects the privacy of individual staff the Company reserves the right to assign the system administrator to track and log Web access, including sites visited, if it believes these rules are being violated.
    20. Staff are prohibited at all times from using the Company’s computers for shopping, trading in stocks, shares or other negotiable instruments, or participating in online auctions.

  • I have read and understood the Internet Access section

  • Initial

E-mail Usage

  • 21. No e-mail may be sent or forwarded through a Company computer for purposes that violate Company policies or for an illegal or criminal purpose.




    22. Electronic mail, like user files, is kept as private as possible. Attempts to read another person’s electronic mail will be treated with the utmost seriousness. The Company and its administrator of the e-mail system will not read mail unless necessary in the course of their duties. Also, there may be inadvertent inspection in the ordinary course of managing and maintaining the computer network and in carrying out other day-to-day activities. On central systems e-mail that cannot be delivered to one or more addressees is directed to the system administrator for purposes of assuring reliable e-mail service.
    23. Users should be aware that their “deletion” of electronic information will often not erase such information from the system’s storage until it is overwritten with other data and it may, in any case, still reside in the Company’s network either on various back-up systems or other forms, and even if erased, may still exist in the form of print-outs. Nuisance e-mail or other online messages such as chain letters, obscene, harassing, or other unwelcome messages are prohibited. This includes using computers or electronic mail to act abusively toward others or to provoke a violent reaction, such as stalking, acts of bigotry, threats of violence, or other hostile or intimidating “fighting words.” Such words include those terms widely recognized to victimize or stigmatize individuals on the basis of race, ethnicity, religion, sex, sexual orientation, disability, and other protected characteristics.
    24. Unsolicited e-mail messages to multiple users are prohibited unless explicitly approved by the appropriate department head. All messages must show accurately from where and from whom the message originated. Inappropriate mass mailing or talk requests such as multiple mailings to newsgroups, mailing lists, or individuals (e.g., “spamming,” “flooding,” “blogging,” “bombing” or “snerting”) are serious violations of Company policy.
    25. The Company reserves the right to refuse mail and other connections from outside hosts that send unsolicited, mass or commercial messages, or messages that appear to contain viruses to Company or other users, and to filter, refuse or discard such messages.

  • I have read and understood the E-mail Usage section

  • Initial

Software policy

  • 26. It is the policy of Company to respect all computer software copyrights and to adhere to the terms of all software licenses to which the Company is a party. Company employees and others working on behalf of Company (such as independent contractors) may not—
    a. duplicate any licensed software or related documentation for use either on Company premises or elsewhere without obtaining written permission from the system administrator and then only provided the Company is expressly authorized to duplicate the software by agreement with the licensor;
    b. use software on multiple machines or local area networks unless authorized by Company’s license agreements;
    c. give software used by the company to any third parties, including contractors and customers; and




    d. use or install on any Company computer system any software that has not been provided by Company or approved in writing by the system administrator. Any personal software approved for use shall be registered with the system administrator and shall be recorded as personally owned. Approval may be withheld by the system administrator for any reason. In the event the system administrator believes, in his or her sole discretion, that approved software may harm computer equipment, is improperly licensed or is infected by a computer virus, the system administrator may direct the employee or contractor to remove the software from Company’s computer equipment and the employee shall comply with such direction.
    27. All software acquired by the Company must be purchased by the system administrator. Software acquisition is restricted to ensure that the Company has a complete record of all software that has been purchased for Company computers and can register, support, and upgrade such software. The Company will not provide support for software that has not been approved for purchase pursuant to the terms of the Company Computer Software Policy.
    28. Unauthorized duplication of software may subject employees and/or the Company to both civil and criminal penalties under the Copyright Act.

  • I have read and understood the Software policy section

  • Initial

  • Violations of these policies may result in the immediate suspension of computer account and network access pending investigation of circumstances and may lead to their eventual revocation. Serious violations of the policy will be referred directly to management; unauthorized use of the Company computing facilities can be a criminal offence. The penalties may be as severe as suspension or dismissal from the Company and/or criminal prosecution.
    I have read and understood this policy statement:

  • Print Name

  • Signature

  • Date and Time

The templates available in our Public Library have been created by our customers and employees to help get you started using SafetyCulture's solutions. The templates are intended to be used as hypothetical examples only and should not be used as a substitute for professional advice. You should seek your own professional advice to determine if the use of a template is permissible in your workplace or jurisdiction. You should independently determine whether the template is suitable for your circumstances.