Commit f5cccc03 authored by Marcello Evangelista's avatar Marcello Evangelista

Patching is now part of the acceptable usage term.

parent 619d987b
......@@ -4,7 +4,7 @@ The purpose of this policy is to outline the acceptable use of computer equipmen
# Scope
This policy applies to the use of information, electronic and computing devices, and network resources to conduct OlinData BV business or interact with internal networks and business systems, whether owned or leased by OlinData BV, the employee, or a third party. All employees, contractors, consultants, temporary, and other workers at OlinData BV and its subsidiaries are responsible for exercising good judgment regarding appropriate use of information, electronic devices, and network resources in accordance with OlinData BV policies and standards, and local laws and regulation. Exceptions to this policy are documented in section 5.2
This policy applies to the use of information, electronic and computing devices, and network resources to conduct OlinData BV business or interact with internal networks and business systems, whether owned or leased by OlinData BV, the employee, or a third party. All employees, contractors, consultants, temporary, and other workers at OlinData BV and its subsidiaries are responsible for exercising good judgment regarding appropriate use of information, electronic devices, and network resources in accordance with OlinData BV policies and standards, and local laws and regulation. Exceptions to this policy are documented at the compliance section.
This policy applies to employees, contractors, consultants, temporaries, and other workers at OlinData BV, including all personnel affiliated with third parties. This policy applies to all equipment that is owned or leased by OlinData BV.
......@@ -36,6 +36,8 @@ This policy applies to employees, contractors, consultants, temporaries, and oth
1. Employees must use extreme caution when opening e-mail attachments received from unknown senders, which may contain malware.
1. Security patches should be applied as soon as they are made available by the hardware/application vendor. The patching routine will be closely monitored by the Infosec Team.
Unacceptable Use
The following activities are, in general, prohibited. Employees may be exempted from these restrictions during the course of their legitimate job responsibilities (e.g., systems administration staff may have a need to disable the network access of a host if that host is disrupting production services).
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment