Internet and IT communication tools policy
The purpose of this policy is to provide a clear understanding of acceptable use when using Wrens IT
resources and systems. These resources include but are not limited to, internet browsing, Microsoft Teams,
8x8 and email.
This policy applies to all Wren employees, contractors, and personnel for, or on behalf of, Wren.
1 General Principles
-
Use of the internet by Wren staff is permitted and encouraged where such use supports the goals
and objectives of the company.
-
Use of Wren IT systems is monitored for security and / network management reasons. Users may
also be subject to limitations on their use of such resources.
-
The use of computing resources is subject to UK law and any illegal use will be dealt with
appropriately. For example, police forces can have a right of access to recorded data in pursuit
of a crime.
-
Use of any IT Wren resources must comply with the Wren GDPR Policy.
2 IT Use and Behaviour
-
The use of any Wren IT resources must comply with the Wren Code of Conduct Policy
It is unacceptable to:
-
Visit internet sites that contain obscene, hateful or other objectionable materials.
-
Upload, download or otherwise transmit commercial software or any copyrighted materials
belonging to parties outside of the company, or the company itself unless this download is
covered or permitted under a commercial agreement or other such license or provision.
-
Download any software or electronic files without virus protection measures that have been
approved by the company.
-
Intentionally interfere with the normal operation of the network, including the propagation of
computer viruses, and sustained high volume network traffic that substantially hinders others in
their use of the network.
-
Monitor network traffic content or scan devices connected to the network without explicit
approval of the IT department.
3 Policy Compliance
The Wren IT teams will verify compliance to this policy through various methods, including but not
limited to, periodic walk-throughs, video monitoring, business tool reports, internal and external
audits, and feedback to the policy owner.
An employee found to have violated this policy may be subject to disciplinary action in accordance with
the HR Policy