Professional Documents
Culture Documents
Acceptable Usage Policy - v.2.0
Acceptable Usage Policy - v.2.0
Revision History
Description of Date of
Sr. No. Ver Author Reviewed By Approved By
Change Revision
1 1.0 Version 1.0 Pradeep C. S. Vamsi Krishna Satyashil Rane 01-Apr-2014
Mark Smith Kishor Vaswani
2 1.1 Review 15-Jul-2015
Mark Smith Kishor Vaswani
3 1.2 Review 14-May-2016
Mark Smith Kishor Vaswani
4 1.4 Review 12-Apr-2016
Chaitany Kamble Kishor Vaswani
5 1.5 Review 20-Sep-2017
Chaitany Kamble Mark Smith
6 1.6 Review 29-May-2018
Chaitany Kamble Mark Smith
7 1.7 Review 26-Jul -2019
Annual
8 1.8 Review, No ISMS Team Satinder Kaur Satya Rane 20-Oct-2020
Change
Annual
Risk 13-October-
9 1.9 Review, No Shreyas Tambe Shamala Boyd
Management 2021
Change
Annual
Review,
additional Risk 07-September -
10 2.0 Jhon Gavilan Shamala Boyd
responsibility Management 2022
statements
added
The purpose of this policy is to define the acceptable and unacceptable usage of ControlCase
information, IT assets and associated information processing facilities.
2 Scope
The Acceptable Use Policy applies to all the end-users, business partners, third parties, who shall
access ControlCase IT Assets / related Information Processing systems, and / or the information
stored within.
3 Reference
Description of Document
Human Resources Security Policy
Internet Access Policy
Email Policy
Mobile Computing and Teleworking Policy
Incident Management Policy
Users are required to abide by the terms and conditions laid down in Internet Access Policy. Users must sign
off the Internet Access Request Form prior to its use.
Users are required to abide by the terms and conditions laid down in Email Policy.
Prior to the usage of ControlCase Email facility, each user must understand Email security guidelines laid down
and Email etiquettes.
Users of ControlCase mobile computing equipment are required to abide by the terms and conditions laid
down in Mobile Computing and Teleworking policy along with the terms and conditions prior to the usage.
• Consider carefully what you write in E-mail, it’s a permanent record and can be easily forwarded to
others.
• Keep email short and to the point.
• One should be very careful while putting company confidential information on E-mail. Check the list
of recipients before sending the mail.
• Never share your user ID or password over the email.
• Never assume that your E-mail can be read by no one except yourself and the recipient, other(s) may
be able to read the mail sent by you.
• Never send company’s confidential information over the Internet to an external mail ID.
• Use “reply to all” with great caution. Re-check the recipient list before sending.
• Never forward or send a chain letter, if you receive one, delete it from the inbox.
• Do not send or forward JUNK mails (mails which do not help in enhancing enterprise or individual
productivity).
• Never send unsolicited mails to any other users or to distribution list.
• Delete unwanted messages immediately since they take up disk storage.
• Employees, end users, partners, 3rd parties, and others, making use of ControlCase resources or
information, should be responsible for their use of any information processing resources and of any
such use carried out under their responsibility.
• Any employee found to have violated this policy might be subjected to disciplinary action, up to and
including termination of employment. Employees are also expected to report any security violations
as per ControlCase Information Security Incident Management policy.