Documente Academic
Documente Profesional
Documente Cultură
Introduction
Novatium is a product & solution development Company focusing on thin client, network
computing, and security solutions. Therefore systems and Internet form part of the daily
routine of the employees.
This policy aims to define the DO's and DONT's for each employee while working on the
premises of the company or while being connected to any utility of the company.
Every employee of Novatium Solution Private Limited is expected to be aware of and follow
the guidelines mentioned in this document. If they have any doubt regarding any of the
points mentioned in this document, they should get it clarified from the Tech Ops/ CIM
department.
Overview
This company provides access to the vast information resources of the Internet to help you
do your job faster and smarter, and be a well-informed business citizen. The facilities to
provide that access represent a considerable commitment of company resources for
telecommunications, networking, software, storage, etc. This Internet usage policy is
designed to help you understand our expectations for the use of those resources in the
particular conditions of the Internet, and to help you use those resources wisely.
While we have set forth explicit requirements for Internet usage below, we would like to
start by describing our Internet usage policy. First and foremost, the Internet for this
company is a business tool, provided to you at significant cost. That means we expect you to
use your Internet access [primarily] for business-related purposes, i.e., to communicate with
customers and partners, to research relevant topics and obtain useful business information
[except as outlined below].
We insist that you conduct yourself honestly and appropriately on the Internet, and respect
the copyrights, software licensing rules, property rights, privacy and prerogatives of others.
To be absolutely clear on this point, all existing company policies apply to your conduct on
the Internet, especially (but not exclusively) those that deal with intellectual property
protection, privacy, misuse of company resources, sexual harassment, information and data
security, and confidentiality.
“Novatium Confidential”
Hard Copies Are Uncontrolled Unless With Signature & Stamp.
NOVATIUM SOLUTIONS (P) LTD.
While our direct connection to the Internet offers vast information of potential benefits, it
can also open the door to some significant risks to our data and systems if we do not follow
appropriate security discipline. As presented in greater detail below, that may mean
preventing machines with sensitive data or applications from connecting to the Internet
entirely, or it may mean that certain users must be prevented from using certain Internet
features like file transfers. The overriding principle is that security is to be everyone's first
concern. An Internet user can be held accountable for any breaches of security or
confidentiality.
2. Any software or files downloaded via the Internet into the company network become
the property of the company. Any such files or software may be used only in ways
that are consistent with their licenses or copyrights.
5. Employees may use their Internet facilities for common browsing or information
search during mealtime or other breaks, or outside of work hours, provided that all
other usage policies are adhered to.
6. Employees with Internet access may download only software with direct business
use, and must arrange to have such software properly licensed and registered.
Downloaded software must be used only under the terms of its license.
7. Employees with Internet access should not use company Internet facilities to
download entertainment software or games, or to play games against opponents
over the Internet.
9. All software used to access the Internet shall be configured to use the firewall http
proxy.
10. Port scanning or security scanning is expressly prohibited, if project work demands
for such test, it should be informed to systems and networking department with all
details of the work.
“Novatium Confidential”
Hard Copies Are Uncontrolled Unless With Signature & Stamp.
NOVATIUM SOLUTIONS (P) LTD.
11. The following are strictly prohibited and violation of the same would attract
disciplinary action
c) Executing any form of network monitoring which will intercept data not
intended for the employee's host, unless this activity is a part of the
employee's normal job.
e) Interfering with or denying service to any user other than the employee's
host (for example, denial of service attack)
2. Always add descriptive subjects for emails. It is a good practice to add the name of
the project or the issue being discussed in the mail.
4. Employees may not forward or otherwise propagate chain letters / pyramid letters,
whether or not the recipient wishes to receive such mailings.
5. Malicious email, including but not limited to "mailbombing" (flooding a user or site
with very large or numerous pieces of email) and "trolling" (posting outrageous
messages to generate numerous responses) is prohibited.
“Novatium Confidential”
Hard Copies Are Uncontrolled Unless With Signature & Stamp.
NOVATIUM SOLUTIONS (P) LTD.
7. Employees are advised not to send email attachments that are more than 1MB of
size [For any exception for individual for any official purpose, it has to be granted
by reporting managers].
8. Emails that contain pornographic, racist, politically incorrect content are forbidden.
10. Sending unsolicited email messages, including the sending of "junk mail" or other
advertising material to individuals who did not specifically request such material
(email spam).
3. Associate should share his iFolder, gforge, [Desktop], Server Authentication, etc to
his manager.
4. Employees must identify their computing work with their own names so that
responsibility for the work can be determined and Employees can be contacted in
unusual situations.
5. Employees must use their computer accounts only for the purposes for which they
are authorized.
7. Employees must not attempt to subvert the restrictions associated with their
computer accounts.
8. Employees are responsible for the usage of their computing server accounts. They
should maintain secure passwords for systems that support them and take
precautions against others obtaining access to their computer resources. Each user is
responsible for all transactions made under the authorization of his or her system
account.
“Novatium Confidential”
Hard Copies Are Uncontrolled Unless With Signature & Stamp.
NOVATIUM SOLUTIONS (P) LTD.
2. All use of software provided by Novatium Solution and all use of computer and
license agreements, this policy statement, and applicable laws govern
telecommunications equipment. Employees agree to comply with all such
restrictions.
3. Inform Systems Dept. immediately if you think that your workstation may have a
virus.
4. Compact Discs and other media should not be brought in to the Company by any
individual, the same would be procured by the company and they should be checked
for viruses by Systems Dept. before use.
5. USB Sticks & external Hard discs are strictly prohibited with the exception of the
ones being used in projects. These should be duly authorised by the Functional Head
& the Tech – Ops team and be duly marked and endorsed in the Assets register.
6. Protect equipment from theft and keep it away from food and drinks. It is suggested
that food and drinks not be brought to workstations.
7. Anyone having Laptop is susceptible to spot checking from system department for
inspection.
9. Logins to, and use of the Company's network are monitored and audited
10. Power off the thin client and/or computer when it is required to be.
Note: No Storage device (USB Sticks/Hard drives/ CD/ DVD) is to move out of the Company
premises without the written approval of HR – Head/ CFO/ COO. Violation of the same
would amount to Data being stolen and would attract severe disciplinary action.
Document covers just about any kind of file that can be read on a computer screen as if it
were a printed page, including the so-called HTML files read in an Internet browser, any file
meant to be accessed by a word processing or desk-top publishing program or its viewer, or
the files prepared for the Adobe Acrobat reader and other electronic publishing tools.
Hard copies of source code / documents shall not be taken out of the premises without
written consent.
“Novatium Confidential”
Hard Copies Are Uncontrolled Unless With Signature & Stamp.