Stc Aula 008

2
Limited Personal Use of Email and the Internet Very limited incidental personal use of these Telcordia communications resources is permitted, subject to the following guidelines: Such usage should normally be outside of working time. All usage of external email and other uses of the internet, whether to post to newsgroups, participate in chatrooms, transfer files, login remotely to external systems and visit external websites, uses the Telcordia name as part of the address. Telcordia forbids its name from being associated with sexual materials, materials offensive to the interests of diversity or that denigrate members of any group mentioned in the discrimination policy, or with other controversial or socially undesirable activities. Additionally, Telcordia has a zero tolerance policy against the use of Telcordia or customer resources (including but not limited to e-mail) to: 1) access internet sites containing discriminatory, pornographic, sexually explicit sexually descriptive, lewd or other such offensive material, and 2) store and/or disseminate discriminatory, pornographic sexually explicit, sexually descriptive, lewd or other such offensive material. Violators will be terminated. Moreover, because representatives of clients who see the Telcordia name when browsing the internet would perceive that Telcordia employees are using client paid time for personal pursuits, employees who use Telcordia communications resources should be mindful of the need to protect the reputation of Telcordia, and that such usage is monitored by the Company. Security of Company Computer Systems Security of Computer Systems Computers, software, and the data stored and processed in them must be adequately safeguarded against damage, alteration, theft, fraudulent manipulation, and unauthorized access, use or disclosure. All employees must strictly adhere to the specific security measures and internal controls that have been established to safeguard computer systems including use of and security of passwords and encryption, when applicable. These specific security measures and internal controls vary depending upon the characteristics of the system and the sensitivity and importance of the data. Access to operating system tools and/or system video data should be provided only to persons having a need for such access. Employees are responsible to safeguard the physical security of their SecureID tokens to prevent unauthorized remote access to Telcordia computer systems. Violations or suspected violations of computer security measures or controls, or any unauthorized communication, must be reported at once to the Information Security and Remote Access group. Computer Hacker Activities No employee may engage in any interaction with hackers on matters related to the computer or network resources of Telcordia or its customers. This includes voice, face-to-face, written or electronic bulletin boards. The only exception is for those employees whose assigned responsibilities for Telcordia include engaging in hacker detection and prevention work. This exception must be authorized, in writing, by the General Counsel. Computer Virus Protection To protect against viruses, vendor-supplied software may only be used if developed by established, reputable firms; all other software must first be tested.

description

aula 8

Transcript of Stc Aula 008

  • Limited Personal Use of Email and the Internet

    Very limited incidental personal use of these Telcordia communications resources is permitted, subject to the following guidelines:

    Such usage should normally be outside of working time. All usage of external email and other uses of the internet, whether to post to newsgroups, participate in chatrooms, transfer files, login remotely to external systems and visit external websites, uses the Telcordia name as part of the address. Telcordia forbids its name from being associated with sexual materials, materials offensive to the interests of diversity or that denigrate members of any group mentioned in the discrimination policy, or with other controversial or socially undesirable activities. Additionally, Telcordia has a zero tolerance policy against the use of Telcordia or customer resources (including but not limited to e-mail) to: 1) access internet sites containing discriminatory, pornographic, sexually explicit sexually descriptive, lewd or other such offensive material, and 2) store and/or disseminate discriminatory, pornographic sexually explicit, sexually descriptive, lewd or other such offensive material. Violators will be terminated. Moreover, because representatives of clients who see the Telcordia name when browsing the internet would perceive that Telcordia employees are using client paid time for personal pursuits, employees who use Telcordia communications resources should be mindful of the need to protect the reputation of Telcordia, and that such usage is monitored by the Company.

    Security of Company Computer Systems Security of Computer Systems

    Computers, software, and the data stored and processed in them must be adequately safeguarded against damage, alteration, theft, fraudulent manipulation, and unauthorized access, use or disclosure.

    All employees must strictly adhere to the specific security measures and internal controls that have been established to safeguard computer systems including use of and security of passwords and encryption, when applicable. These specific security measures and internal controls vary depending upon the characteristics of the system and the sensitivity and importance of the data.

    Access to operating system tools and/or system video data should be provided only to persons having a need for such access. Employees are responsible to safeguard the physical security of their SecureID tokens to prevent unauthorized remote access to Telcordia computer systems.

    Violations or suspected violations of computer security measures or controls, or any unauthorized communication, must be reported at once to the Information Security and Remote Access group.

    Computer Hacker Activities

    No employee may engage in any interaction with hackers on matters related to the computer or network resources of Telcordia or its customers. This includes voice, face-to-face, written or electronic bulletin boards. The only exception is for those employees whose assigned responsibilities for Telcordia include engaging in hacker detection and prevention work. This exception must be authorized, in writing, by the General Counsel.

    Computer Virus Protection

    To protect against viruses, vendor-supplied software may only be used if developed by established, reputable firms; all other software must first be tested.

  • Integrity of Company Records, Reports and AccountsIntegrity of Accounting Transactions - Cash and Credit

    All employees are responsible for following established procedures and guidelines for carrying out and reporting business transactions in a timely manner, including compliance with appropriate authorizations and internal accounting controls.

    All employees must ensure that, when utilizing or expending Company assets, transactions are appropriate, both in nature and amount, and that Telcordia receives proper value. Some examples are:

    Spending Corporate money or personal money that will be reimbursed. Incurring charges to a Corporate account or on a credit card that will be reimbursed. Using Corporate services or supplies such as postage and money orders.

    Corporate charge cards must be used for business purposes only. Expenses such as cash advances and relocation types of expenses must be promptly resolved by the established due date through substantiation of expenditure or by repayment.

    Integrity of Company Documents, Data and Reports

    All employees are responsible for ensuring the integrity of Company financial, technical and business documents, data and reports. Employees responsible for maintaining Company books, records, and accounts must do so in an accurate and auditable manner. They must carefully and honestly prepare all essential data including, but not limited to, financial data and reports, vouchers, bills, employee time reports, claims submitted under the Telcordia payroll, capital expenditure, and service and performance records.

    By submitting an expense report for approval the employee verifies that the expenses were actually incurred, for the Company's benefit, in the amount claimed and pursuant to accounting instructions.

    All false, incomplete, misleading and inaccurate entries as to disbursements and payments are strictly forbidden.

    Employees approving or certifying the correctness of Company financial documents must obtain reasonable knowledge that the data contained in the documents is correct.

    Managers must not expend Corporate funds to recognize employees, other than those funds expressly authorized for such purposes.

    Integrity of Financial Estimates (Estimates At Completion)

    Employees responsible for the creation, maintenance and review of estimates used by the Company in determining accrued revenue must document their assumptions in an auditable manner, and when changes occur, must use prudent judgment in the recreation of those estimates. All such estimates must be based on the Companys policies and practices applicable to the calculation of revenue and the estimation of related costs. All changes must be documented in an auditable manner.