Acceptable Use of Assets. 1.1.1 If Avanade devices will be used to access Client Personal Data, Avanade will require its Personnel to use these devices in accordance with Avanade’s device usage proce- dures. X
1.1.2 Avanade will require its Personnel to comply with Client provided guidelines govern- ing Avanade’s use of any Client provided devices that may be used to access Client Personal Data as part of a project. X
1.1.3 Avanade will implement processes designed to require its subcontractors to comply with Avanade procedures governing the use of any subcontractor provided devices that may be used to access Client Personal Data. X
1.1.4 Avanade will require Client Personal Data to be securely removed from all Avanade or subcontractor devices assigned to the project prior to reassignment. X
1.1.5 Client will configure and maintain any Client provided devices, equipment, applica- tions, infrastructure, or any other Client furnished items, provided to Avanade for use as part of any Services, in accordance with industry standards, including without limi- tation, updating such devices or equipment with the most up to date patches, signa- tures for anti-malware, firewalls, etc. X
Acceptable Use of Assets. 11.1. The Data Processor shall implement rules for the acceptable use of information and of assets associated with information and information processing facilities are identified, documented and implemented.
Acceptable Use of Assets. Company will ensure rules for the acceptable use of information and of assets associated with information and information processing facilities are identified, documented and implemented.
Acceptable Use of Assets. Information assets may be used only for carrying out Xxxxxxx Group activities. Definition: Information asset – an information asset is a body of information, defined and managed as a single unit so it can be understood, shared, protected and exploited efficiently. Each employee is responsible for safeguarding their Xxxxxxx Group issued equipment (e.g. laptops) and must immediately report to the service desk if the security of the device is compromised including loss or theft of the device. Users may not visit Internet sites that contain obscene, hateful, illegal or other inappropriate (including online gambling) material, and shall not make or post indecent remarks, proposals or materials on the Internet or company equipment. It is prohibited to use information assets in a manner that unnecessarily uses capacity, weakens the performance or poses a security threat. Users may use the information asset only for purposes for which they have been authorised and must not take part in activities which may be used to bypass information security controls.
1. To access Xxxxxxx Group internal networks with any devices that are not authorised devices
2. To download images or video files or any other files which do not have a business purpose, send E-mail chain letters, play games, etc.
3. To install software on a local computer without explicit permission from IT
4. To use cryptographic tools (encryption) on a local computer, except in the cases outlined by the Information Security policies and procedures.
5. To install or use peripheral devices such as modems, memory cards or other devices for storing and reading data (e.g. USB flash drives) without explicit permission by the approved line manager and IT. Employees, contractors, suppliers, stakeholders or other third parties must store working information on Xxxxxxx Group drives where possible and not use or store data on local hard drives. Where a situation dictates you must store information locally, this information must be encrypted and transferred to the appropriate Xxxxxxx Group network location at the next available opportunity.
Acceptable Use of Assets. Rules for the acceptable use of information and of assets associated with information and information processing facilities are identified, documented and implemented.
Acceptable Use of Assets. The System Security Manager is to ensure that rules for the acceptable use of assets have been documented and distributed to all computing system users. Such rules are defined in the Acceptable Use of IT Policy and the Acceptable Use of IT for System Administrators Policy.