Data Security Policy
Data Security Policy
I have received a copy of HESL (Karnataka) security policy # SP 2001/01, dated 20.06.2002
covering
a) Network, Internet, Intranet & Email usage & Security Policy – Annexure I
b) Password & Disk Non-Sharing Security Policy – Annexure II
I recognize and understand that the company’s electronic communication and network
infrastructure are to be used for conducting the company’s business.
I am aware that violations of this Policy may subject me to disciplinary action, up to and
including discharge from employment. I further understand that all my communications
reflect HESL worldwide to our competitors, consumers, customers and suppliers.
HR Head’s Signature
Annexure I
The uses of Internet, Intranet and Email are the means to make business and
communication very effective. These are valuable and costly Corporate resources to
facilitate the business of the company. Irresponsible use of these resources not only reduces
the availability of these resources for critical business operations but may compromise on
Corporate Data Security and network Integrity leaving the company open to potential
damaging litigation.
For effective and secured uses of above facilities, the following policy needs to be adhered
to by the employee:
3. Communications
Each employee is responsible for the content of all text, audio or images that is
place or send over the company’s e-mail and Internet system. No e-mail or other
electronic communications may be sent that hides the identity of the sender or
represents the sender as someone else or someone from another company. All
messages communicated on the company’s e-mail and Internet system should
contain the employee’s name.
5. Copyright Issues:
Employees on the company’s e-mail and Internet system may not transmit
copyrighted materials belonging to entities other than this company. Please note
that non-adherence to this policy puts the company in serious legal jeopardy and
opens the company up to significant lawsuits and public embarrassment. All
employees obtaining access to other companies’ or individuals’ material must
respect all copyrights and may not copy, retrieve, modify or forward copyrighted
materials, except with permission. Failure to observe copyright or license
agreement may result in disciplinary action. If you have questions about any of
these legal issues, please speak with your Functional Head/IS/Legal before
proceeding.
6. Security :
The company may routinely monitors usage patterns in its e-mail and Internet
communications. The reasons for this monitoring are many, including cost
analysis, security, bandwidth allocation and the general management. All
messages created, sent or retrieved over the company’s E-mail, Intranet and
Internet is the property of the company. Pl. note that the company does not
presently intend to examine the content of the communication over the Internet
whether in email, chat or any other media. However, intention to monitor the
extensions of the tracks being generated much like the telephone bills tracks the
calls made, number of the call and the time of the call but not the conversation.
However, the company reserves the right to access and monitor the content of all
messages and files on the company’s e-mail and Internet system at any time in
the future with or without notice. Employees should not assume electronic
communications are totally private and should transmit highly confidential data in
other ways. E-mail messages regarding sensitive matters should not warn that
such communications are not intended to be secure or confidential. This is just
good business sense.
PASSWORD & DISK NON-SHARING POLICY
We, in HESL, are handling very sensitive and confidential data. It is important as
well as mandatory to ensure the security of data. We recommend the following
with a request to adhere to the same”
c. Deciding password: It has also been observed that people are using most
common personal elements for defining their password. It is strongly
recommended that password should be unique and should not have any
resemblance to common personal information e.g. your name/spouse’s
name/telephone no./vehicle no./date of birth etc. Moreover, please memorize
and avoid to write down your password specially at most obvious & visible
places like calendar on your desk, diary, scratch pads etc.