Edit on GitHub

Computer usage and security policy.

This policy applies to team members employed by Deeson Group Ltd and Deeson Publishing Ltd.

Mandated security practices to follow.

  1. FileVault (whole disk encryption) must be enabled on all devices.

  2. You must have a password on screensaver/sleep (not more than 15 minutes).

  3. You must keep operating system and application updates current. For major OS upgrades please wait until the company has tested the upgrade and notified all team members before proceeding.

  4. Don’t install software that might compromise network or computer security.

  5. You must have long and unique passwords for each online account. These must be stored in the approved company password management system (LastPass) only.

  6. You must not change either the primary user or the administrator account passwords on your company-supplied laptop.

  7. Your primary user account (the one that you use to work from) must not have been set to default to administrator/root privileges.

  8. Keep your laptop as physically secure as you would your wallet.

  9. A passcode must be set on all mobile devices, including personal devices with access to company data, e.g. iPads, iPhones and smartphones.

  10. You must not transfer or copy any company or client data to personal devices. The only exception to this is the use of personally owned mobile devices in line with this policy.

  11. You must complete the monthly IT self-assessment checklist.

Full guidelines.

  1. For consistency, all staff must use a company provided MacOS-based laptop as their primary machine for work. You must not replace the operating system on your machine.

  2. Use of the internet by employees is permitted and encouraged, where such use is appropriate for business purposes and supports the goals and objectives of Deeson.

  3. The employee social media policy must be adhered to.

  4. You must not use the internet or company network for any illegal activity, including unauthorised access to other computer systems, or attempts at such unauthorised access. Attempts to cause failure of a machine are regarded as unauthorised access.

  5. If you have been given an email or other access account, you must take reasonable steps to keep your password or other access token secure. There will be a presumption that actions carried out with your account were authorised by you.

  6. The use of our network for the sending of unsolicited commercial email is strictly prohibited.

  7. Company-provided resources, such as internet and network connections, email privileges, laptops and mobile devices, are intended to be used for business purposes and reasonable personal usage only. Employees should be aware that usage is monitored for unusual activity.

  8. No attempt is made to monitor individual communications; however, correspondence via email is not guaranteed to be private. Use of the internet/intranet and email may be subject to monitoring for security and/or network management reasons.

  9. Communications of a sensitive or confidential nature should not be sent unless they are encrypted. It should be made clear to recipients that opinions expressed by individuals are not necessarily those of the company. The company reserves the right to determine the suitability of this information.

  10. The company may be required to access your laptop from time-to-time. We’ll tell you when we do this. Examples of reasons why we may need to do this include maintenance and support, data retrieval for business needs or if required by law enforcement.

  11. We roll out major OS upgrades under a controlled schedule. You should not upgrade your Mac from one major version of MacOS to the next, until instructed to do so.

Conditions of use.

The following practices are considered unacceptable and may be subject to disciplinary action, including written warnings, revocation of access privileges, and, in extreme cases, termination of employment. The company also reserves the right to report any illegal activities to the appropriate authorities.

  1. Visiting internet sites that contain obscene, hateful or otherwise objectionable materials; sending or receiving any material that is obscene or defamatory, or which is intended to annoy, harass or intimidate another person.

  2. Wasting excessive time on non-company business.

  3. Soliciting emails that are unrelated to business activities, or soliciting non-company business for personal gain or profit.

  4. Representing personal opinions as those of the company.

  5. Using the internet for gambling or illegal activities.

  6. Making or posting indecent materials. Disseminating information that is likely to cause offence.

  7. Uploading, downloading or otherwise transmitting, commercial software or copyrighted material in violation of its copyright.

  8. Downloading any software or electronic files without adhering to virus protection measures that have been approved by the company.

  9. Revealing or publicising confidential or proprietary information which includes, but is not limited to, financial information, new business and product ideas, marketing strategies and plans, company databases and the information contained therein, customer lists, technical product information, computer software source codes, computer network access codes and details of business partnerships.

Returning equipment.

When returning equipment, for example if you are leaving Deeson, you should not remove any company data from it. This means that neither your laptop nor backup disk should be erased, including previous versions from your backup disk.

The company will archive data on all staff machines after they are no longer in use, for a period of at least one month before data is destroyed. We will only access this data in line with our full guidelines above.