Internet and IT communication tools policy

The purpose of this policy is to provide a clear understanding of acceptable use when using Wrens IT resources and systems. These resources include but are not limited to, internet browsing, Microsoft Teams, 8x8 and email. This policy applies to all Wren employees, contractors, and personnel for, or on behalf of, Wren.

1 General Principles

  1. Use of the internet by Wren staff is permitted and encouraged where such use supports the goals and objectives of the company.

  2. Use of Wren IT systems is monitored for security and / network management reasons. Users may also be subject to limitations on their use of such resources.

  3. The use of computing resources is subject to UK law and any illegal use will be dealt with appropriately. For example, police forces can have a right of access to recorded data in pursuit of a crime.

  4. Use of any IT Wren resources must comply with the Wren GDPR Policy.

2 IT Use and Behaviour

  1. The use of any Wren IT resources must comply with the Wren Code of Conduct Policy

    It is unacceptable to:

  2. Visit internet sites that contain obscene, hateful or other objectionable materials.

  3. Upload, download or otherwise transmit commercial software or any copyrighted materials belonging to parties outside of the company, or the company itself unless this download is covered or permitted under a commercial agreement or other such license or provision.

  4. Download any software or electronic files without virus protection measures that have been approved by the company.

  5. Intentionally interfere with the normal operation of the network, including the propagation of computer viruses, and sustained high volume network traffic that substantially hinders others in their use of the network.

  6. Monitor network traffic content or scan devices connected to the network without explicit approval of the IT department.

3 Policy Compliance

The Wren IT teams will verify compliance to this policy through various methods, including but not limited to, periodic walk-throughs, video monitoring, business tool reports, internal and external audits, and feedback to the policy owner.

An employee found to have violated this policy may be subject to disciplinary action in accordance with the HR Policy