USER ACCEPTANCE POLICY

All Users have responsibilities and obligations in respect of the information systems and the data they manage.

Access to Axle Cloud’s hosting systems and/or your company’s computer systems is subject to the following conditions:

  1. Users must ensure that they keep their individual or company passwords confidential. Passwords must not be shared with any third party or person. A paper record must not be kept unless stored in a secure manner.
  2. When you resign or leave your company, you or your company manager must notify the IT Team immediately.
  3. Users must not attempt to bypass or defeat the security systems. Any attempt to obtain/use of passwords or privileges issued to other users is not acceptable.
  4. Workstations must not be left logged on to any system whilst unattended.
  5. Users must not knowingly access or download content for which they are not authorized, as is downloading content protected from copying and re-distribution by copyright laws.
  6. Users must complete and pass the Cyber Security Training Course.
  7. Users must read and understand the Acceptable Usage Policy (next section), prior to accessing the system.
  8. If a user suspects a security breach has occurred they must immediately notify the IT Team.

It is vital that the above conditions of use are maintained by you, and your company, failure to do so may result in security breaches and access to your confidential client data. Any breaches of the above conditions will be reported to the relevant company managers and system access will be revoked.

ACCEPTABLE USAGE POLICY

PURPOSE

The purpose of this policy is to ensure the Information Technology environment is safe, reliable and functioning to its full capability. This document provides guidelines to all who access the Axle Cloud supplied and managed services, and such guidelines will guarantee Axle Cloud can adequately meet all user expectations

SCOPE

This Policy applies to all users, including internal and external users, and any other party given access to your company’s computer systems.

COMPLIANCE

Violations of this policy may result in suspension or termination of access to all Axle Cloud’s hosted systems, all company’s computer systems, and/or applications without any notice. All inappropriate and unlawful actions will be logged and passed on to the relevant judicial authorities.

POLICY

Appropriate Use:

Users are encouraged to use the computer systems to better meet their work objectives and access the system with the intent to meet their core business requirements.

Inappropriate Use:

Computer system use and access to other interconnected networks, including Email and Internet, should not interfere with other users. Examples or inappropriate use would include, but not limited to:

  1. Any illegal or unlawful purposes such as copyright infringement, obscenity, libel, slander, fraud, defamation, harassment, intimidation, forgery, impersonation, illegal gambling, etc.
  2. Creation, transmission, storage, downloading or displaying of any offensive, obscene, indecent images and data.
  3. Inappropriately viewing, copying, altering, or destroying data, software, documentation, or data communications belonging to our clients or another individual without authorized permission.
  4. Sharing computer accounts or loaning accounts or passwords to other third parties, not recognized as an employee or affiliate of the client’s business.
  5. Installation, distribution and use of illegally copied software or software not appropriately licensed by yourself, or the user themselves.
  6. Use of the hosted systems to gain unauthorized access or attempt to gain unauthorized access to any other IT systems.
  7. Deliberate computer tampering such as introducing malicious programs into the network e.g., computer viruses or worms.
  8. Deliberately attempting security breaches or attempting to bypass legitimate security devices such as firewalls. Continuous attempts to access or circumvent authorized access to servers or network attached equipment the user does not have authority to access is strictly prohibited.
  9. Disruption of network communication or integrity which would include activities such as network monitoring, packet spoofing, forging, flooding, port scanning or attempting denial of service attacks.
  10. The irresponsible use of system resources, both the servers themselves and all hosted interconnected networks, and the intent to cause harm or destruction of other users’ or our property, including hardware, software, and data.