The AUP is critical for ensuring that technology resources at Cloudian International (Hong Kong) Limited ("Company")are used appropriately and responsibly. The purposes of this policy include:
Security: To protect the confidentiality, integrity, and availability of the Company's technology resources from unauthorized access and damage.
Compliance: To ensure that all technological practices are in accordance with all applicable laws and regulations.
Productivity: To minimize the risk of technology resources being used in a manner that impairs workplace productivity.
Awareness: To educate users about their responsibilities and the acceptable use of technology resources.
The Company’s technology resources are vital for day-to-day operations. This Acceptable Use Policy outlines the appropriate use of these resources to ensure they are used safely, legally, and ethically. Adherence to this policy is mandatory for all employees and contractors of the company.
Ownership: All communications and stored information transmitted, received, or stored in the Company’s network are the property of the Company.
Privacy: Users should have no expectation of privacy in their use of company resources. The company reserves the right to review any material on its computer systems at any time to ensure compliance with this policy.
User Compliance: Users are expected to follow this policy and all related security procedures to protect organizational assets.
Data Protection: Users must protect sensitive data according to the Company’s data security protocols.
Virus Protection: Users must ensure that all devices are protected by up-to-date antivirus software and must not disable such protection.
Password Security: Strong passwords must be used and changed regularly in accordance with the Company’s's password policy.
Internet Use: The internet should be used responsibly and primarily for professional or business-related purposes. Personal use should not interfere with professional responsibilities.
Email Use: Email resources must be used efficiently for business purposes, although reasonable personal use is allowed if it does not affect business operations or security.
Software: Users may only install software that has been approved by the Company, and must not use unauthorized software for any purpose.
Prohibited Actions: The following actions are not permitted:
Users must not engage in illegal activities or those that infringe on the rights of others.
Users must not access, download, or distribute pirated materials or software. Doing so violates intellectual property laws.
Users must not use the Company's resources, confidential information, or trade secrets for personal gain, such as operating a business or soliciting for personal causes.
Per our security policy, users must not attempt to access restricted areas of the network or any user account belonging to another employee.
Engaging in activities that could harass, degrade, intimidate, or create a hostile working environment for others is strictly prohibited.
Monitoring: the Company reserves the right to monitor all use of its technology resources to ensure compliance with this policy. This monitoring may be conducted without notice and may include logging internet usage, auditing files, and reviewing email communications.
Consequences of Violations: Violations of this policy will result in disciplinary action, which may include termination of employment, legal action, and compensation for damages caused to the Company.
Reporting Violations: Employees are encouraged to report any suspected violations of this policy to their supervisor or the IT department.
All employees, contractors, and other users of the Company Name's technology resources must acknowledge that they have read, understand, and agree to abide by this policy. Failure to comply with this policy may result in disciplinary action up to and including termination of employment.
Last updated: 2024-10-01