Acceptable Use Policy Notification

Overview

  1. Purpose

The purpose of this Acceptable Use Policy (AUP) is to ensure the secure, ethical, and legal use of all resources, including but not limited to computer systems, company email, third-party Software as a Service (SaaS) applications, data, and storage media, within Edge Services and Solutions.

  1. Scope

This policy applies to all employees, contractors, consultants, temporary workers, and other personnel who have access to Edge’s  information technology resources/systems or use them in any capacity.

  1. Policy

General Use

  1. Authorized Use: Information technology resources provided by Edge are to be used for business purposes only. Employees must use these resources in a manner that is consistent with their job responsibilities and in compliance with all applicable laws and regulations.
  2. Prohibited Activities: The following activities are strictly prohibited:
    • Unauthorized access to or use of company resources, including attempts to circumvent security measures.
    • Use of company resources for illegal, fraudulent, or malicious activities as well as for personal use..
    • Introducing malicious software, including viruses, worms, and malware, onto company systems.
    • Unauthorized disclosure, alteration, or destruction of company data or confidential information.
    • Violation of copyright, trademark, or intellectual property rights, including unauthorized sharing or distribution of copyrighted materials.

Use of Computer Systems and Devices

  1. System Security: Employees must not disable or bypass security mechanisms, install unauthorized software, or alter configurations on company-provided computer systems or devices.
  2. Remote Access: Remote access to company systems must be conducted through secure methods and in accordance with Edge’s remote access policy.

Use of Company Email

  1. Email Security: Employees must not send confidential information via unencrypted email unless explicitly authorized. All email communications must be professional and comply with Edge’s email usage guidelines.
  2. Phishing Awareness: Employees must exercise caution and verify the authenticity of emails before clicking on links or opening attachments, especially those from unknown or suspicious sources.

Use of Third-Party SaaS Applications

  1. Account Security: Employees must safeguard their login credentials for third-party SaaS applications and report any suspected unauthorized access immediately.
  2. Data Handling: When using third-party SaaS applications, employees must adhere to data protection guidelines and ensure that company data is handled in accordance with privacy policies and legal requirements.

Use of Data and Storage Media

  1. Data Protection: Employees must protect company data from unauthorized access, loss, or theft. Data should be stored only on approved devices and encrypted when stored on portable media.
  2. Media Disposal: When disposing of storage media (e.g., USB drives, external hard drives), employees must ensure data is securely erased to prevent unauthorized access.
  1. Compliance

  1. Monitoring:Edge reserves the right to monitor the use of its information technology resources to ensure compliance with this policy and to protect its interests.

  2. Consequences of Non-Compliance: Violations of this policy may result in disciplinary action, up to and including termination of employment or contract, as well as legal action where appropriate.

  1. Policy Review:This policy will be reviewed annually and updated as necessary to reflect changes in technology, threats, and regulatory requirements.

  1. Acknowledgment:By using Edge’s information technology resources, employees acknowledge their understanding of and agreement to comply with this Acceptable Use Policy.