Policy Notice

Topics: PCI DSS, Morality, Ethics Pages: 3 (631 words) Published: January 20, 2013
To Whom It May Concern:

Thanks for all of your hard work and dedication to the company. We at MGI appreciate the level of gratitude that all of you put forth to make this company a driving force. Our major concern is that all employees in our company understand and comply with company policy. This Acceptable Use Policy (AUP) sets forth the Company’s policy with regard to the use of Autosource Group, Inc. (AGI) Computer and Network Resources. You, the user, are ultimately responsible for your actions in accessing and using Network Resources. As a user of AGI Network Resources, you are expected to review and understand the guidelines and procedures in this document.


This policy applies to all AGI hourly associates who will have access to AGI Network Resources. This also includes all authorized and unauthorized users of AGI Network Resources. AGI Network Resources include electronics devices and contained information owned and operated by AGI, e.g., computers, printers, phones, cell phones, Blackberry devices, network hardware.


This policy sets forth the principles that govern appropriate use of Network Resources, and is intended to promote the efficient, ethical and lawful use of these resources. Employees shall use Network Resources for business in accordance with their job functions and responsibilities, except as directed by management directive or other policies. All Network Resources including all communications services and equipment are the sole property of AGI.

Prohibited Uses: AGI Computers may not be used for the following purposes:

* Commercial Use: Using AGI Network Resources for personal or private gain, personal commercial business, personal business which is injurious to AGI or commercial advantage is prohibited. While use of AGI Network Resource is solely for Company business, some incidental personal use may be permissible, particularly during the employee’s personal time. Personal access to the Internet within...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Security Policies: Importance, Development, Comparison, and Implementation Essay
  • Essay on Security Policy
  • The Role Of Information Security Policy Essay
  • Acceptable Use Policy Essay
  • The Role of Information Security Policy Essay
  • Law & Policy Case Study Essay
  • Essay on Organizational Data Privacy and Security Policy
  • Define An Exceptable Use Policy Essay

Become a StudyMode Member

Sign Up - It's Free