Information and Communication Technology. 18.1 The Employer’s network, personal computers, laptops, mobile storage devices (including smart phones) internet, email or any other communications systems or devices are for business use only. The Employee is not permitted to use personal devices or connect devices to the Employer’s network without the Employer’s express consent. All communication / information including deleted items can be accessed, viewed and monitored by the Employer or Employer’s agent. 18.2 The Employee:- 18.2.1 must comply with all ICT policies, procedures and instructions 18.2.2 must immediately inform the Employer if the Employee believes that ICT security has been compromised. 18.2.3 must not download, install, fileshare or allow to be installed any third party software application or licensed or copyright material (except as authorised and in accordance with the licence) on to the business network, computers or communications devices. 18.2.4 must not disable or uninstall any software applications, or undertake a factory reset on any device belonging to the Employer. 18.2.5 must not use the Employer’s devices to access or send offensive, explicit or illegal material 18.2.6 must not misuse or disclose any passwords / security information relating to any of the Employer’s devices unless authorised to do so.
Appears in 2 contracts
Samples: Fixed Term Individual Employment Agreement, Fixed Term Individual Employment Agreement
Information and Communication Technology. 18.1 The Employer’s network, personal computers, laptops, mobile storage devices (including smart phones) internet, email social media sites or any other communications systems or devices are for business use only. The Employee is not permitted to use personal devices or connect devices to the Employer’s network without the Employer’s express consent. All communication / information including deleted items can be accessed, viewed and monitored by the Employer or Employer’s agent.
18.2 The Employee:-Employee: -
18.2.1 must comply with all ICT policies, procedures and instructions
18.2.2 must immediately inform the Employer if the Employee believes that ICT security has been compromised.
18.2.3 must not download, install, fileshare or allow to be installed any third third-party software application or licensed or copyright material (except as authorised and in accordance with the licence) on to the business network, computers or communications devices.
18.2.4 must not disable or uninstall any software applications, or undertake a factory reset on any device belonging to the Employer.
18.2.5 must not use the Employer’s devices to access or send offensive, explicit or illegal material
18.2.6 must not misuse or disclose any passwords / security information relating to any of the Employer’s devices unless authorised to do so.
Appears in 2 contracts
Samples: Individual Employment Agreement, Individual Employment Agreement