SEVEN IT SERVICES
Acceptable Use Policy
Last Updated: 21st November 2021
Acceptable Use Policy
The Acceptable Use Policy (AUP) defines appropriate uses of the Cloud Platform and The Customer's Data by the Authorised Users. Authorised Users shall keep confidential the use of all internal information security mechanisms and controls to prevent unauthorised access to the Customer's Data. We reserve the right to modify or update the AUP at any time by uploading a revised version to our website.
Accepteble Use
Authorised Users shall maintain all the Customer's Data stored on the Cloud Platform in accordance with this policy.
-
Immediately report any actual or possible theft or unauthorized use of the user’s passwords, the Customer's Data, or the assigned Customer’s IT Assets to the Cloud Solution Provider Service Desk in accordance with this policy.
-
Authorised Users must exercise caution when interacting with email message attachments and website links as they may contain phishing or malicious software.
-
Authorised Users may access, use, or share the Customer's Data stored on the Cloud Platform only for intended business purposes, and they are authorized to do so to fulfil their assigned job duties, or as permitted by applicable local law.
-
Authorised Users must take reasonable precautions to ensure their password is protected against loss, theft, compromise, or misuse by an individual other than Authorised Users.
-
Authorised Users may use software purchased by customer only for its intended business purpose consistent with this policy.
-
The Customer’s IT Assets (such as computers, laptops, and portable devices) must be password protected with an active automatic screen lock feature. You must lock your device when it is unattended and never leave a device unattended in a public place.
-
Authorised Users are responsible for protecting against the loss, theft, or damage to all Customer’s IT Assets assigned to them including but not limited to computer systems, laptops, and portable devices that have been issued.
-
Take measures to prevent the spread of viruses, worms, phishing email messages, and malicious software by not installing unauthorized software, being careful when clicking on any links contained in e-mails, and not opening links or attachments from unexpected senders.
Inappropriate Use
Includes, but is not limited to:
-
Using the Customer’s IT Assets in a manner that jeopardizes the confidentiality, integrity, or availability or safety of the Cloud Platform and the Customer's Data.
-
Using the Customer’s IT Assets, the Cloud Platform, and the Customer's Data in violation of applicable laws or regulations.
-
the Customer’s IT Assets and the Cloud Platform to access, display, send, receive, store, create, or transmit images or communications that mock, degrade, or are disrespectful of a protected class or an individual’s legally protected characteristics.
-
Using the Customer’s IT Assets, the Cloud Platform, and the Customer's Data to access, display, send, receive, store, create, or transmit pornography or sexually explicit images or communications.
Inappropriate Uses of Email, Instant Messaging and Communications
Includes, but is not limited to:
-
Using email or Instant messaging for personal reasons.
-
Using a Cloud Platform email or an instant messaging account to transmit, distribute, or deliver any unsolicited bulk or unsolicited commercial e-mail (i.e., spam).
-
Any form of personal harassment.
-
Forwarding electronic chain letters.
-
Using the Cloud Platform email or an instant messaging account for unauthorized solicitation purposes or promotions.
-
Using the Cloud Platform email or an instant messaging account for purposes outside of assigned job duties or excessive personal use.
-
Using the Cloud Platform email account to state or imply that you are authorized to speak on behalf of the customer unless you are authorized to do so.
Inappropriate Uses of the Customer's IT Assets
Includes, but is not limited to:
-
Using another individual's account or attempting to capture or guess other users' passwords.
-
Sharing passwords with others or allowing someone else to use your password.
-
Allowing unauthorized users to access the Cloud Platform by using the Customer’s IT Assets.
-
Tampering with, disabling, or otherwise interfering with security controls on the Cloud Platform.
-
Installing software for personal use on the Customer’s IT Assets unless authorized by the Cloud Solution Provider.
-
Unauthorized access, transmission, or distribution of copyrighted materials where the customer does not have an active license.
-
Violating of the rights of any person or company protected by copyright, trade secret, patent or other intellectual property, or similar laws or regulations, including but not limited to, the installation or distribution of “pirated” software/content products that are not appropriately licensed for use by the customer.
-
Using or installing software applications or technologies that have not been approved by the Cloud Solution Provider.
-
Attempting to access restricted portions of the Cloud Platform, an operating system, security software, or other administrative applications without prior authorization by the Cloud Solution Provider.
-
Using the Customer’s IT Assets in conjunction with the execution of programs, software, or processes that are intended to disrupt (or that could reasonably be expected to disrupt) other computer or network users, or damage or degrade performance, software, or hardware components of a system.
-
Using hacking tools that are used to assess security or to attack computer systems or networks.
-
Knowingly establishing, or causing to be established, communications to systems that could allow unauthorized access to the Customer's Data, the Cloud Platform and the Customer’s IT Assets.
-
Using the Customer’s IT Assets other than for their intended and authorized purposes, including but not limited to mining cryptocurrency and operating or assisting in the operation or operating of a non-Customer business.