...
The following topic-specific policies and procedures are relevant to this document:
Information Security Policy
Electronic Messaging Policy
Internet Acceptable Use Policy
Mobile Device Policy
Software Policy
Access Control Policy
Anti-Malware Policy
Social Media Policy
Asset Management Policy
Acceptable use policy
Please ensure you have read and understood the following summary of the main points of the organisations policies regarding information security.
...
You must not send messages containing material, which is defamatory, obscene, does not comply with the organisations equality and diversity policy or which a recipient might otherwise reasonably consider inappropriate. In particular, organisation electronic messaging facilities must not be used:
For the distribution of unsolicited commercial or advertising material, chain letters, or other junk-mail of any kind, to other organisations
To send material that infringes the copyright or intellectual property rights of another person or organisation
For activities that corrupt or destroy other users’ data or otherwise disrupt the work of other users
To distribute any offensive, obscene or indecent images, data, or other material, or any data capable of being resolved into obscene or indecent images or material
To send anything which is designed or likely to cause annoyance, inconvenience or needless anxiety to others
To convey abusive, threatening or bullying messages to others
To transmit material that either discriminates or encourages discrimination on the grounds of race, gender, sexual orientation, marital status, disability, political or religious beliefs
For the transmission of defamatory material or false claims of a deceptive nature
For activities that violate the privacy of other users
To send anonymous messages - i.e. without clear identification of the sender
For any other activities which bring, or may bring, the organisation into disrepute
If you are not sure whether your intended message falls into this category, please consult your line manager before sending.
...
Your Internet access on organisation-owned devices is primarily provided for tasks reasonably related to your work including:
Access to information and systems that is pertinent to fulfilling the organisations business obligations
The capability to post updates to organisation-owned and/or maintained web sites and social media accounts
An electronic commerce facility (e.g. purchasing equipment for the organisation)
Research
Other tasks that are part of your job role
The organisation permits personal use of the Internet in your own time (for example during your lunch break), provided it does not interfere with your work. Any exception to this is at the discretion of your line manager.
Except where it is strictly and necessarily required for your work, for example IT audit activity or other investigation, you must not use the Internet access provided by Vertic Pty Ltd to:
...