IT Acceptable Use Policy
Version 2.1
October 2020
Essentra plc, together
with its affiliates and subsidiaries (“Essentra”), is committed to doing business
the right way, to continually earn the trust of customers, other stakeholders
and the wider marketplace. In accordance with the Essentra Ethics Code, the
Board of Directors and the Group Management Committee expect all employees –
and anyone carrying out work on behalf of Essentra – to maintain the highest
standards of ethical business conduct and personal behaviour at all times, and
to act safely, honestly, responsibly, lawfully and with integrity.
In support of this
commitment, and consistent with its Six Principles, Essentra seeks to maintain
a culture of openness and accountability, so that prompt action can be taken to
address any illegal or unethical conduct involving anyone working for or on
behalf of Essentra. Attitudes or activities that amount to a breach of law or
trust, or otherwise fall below the highest standards of ethical business
conduct and personal behaviour will not be tolerated. It is the responsibility
of all Essentra employees to ensure that they report any infringement or suspected
infringement of legal or regulatory requirements or the highest standards of
ethical business conduct involving Essentra to their Line Manager or otherwise
in accordance with the Essentra ‘Right to Speak’ Policy.
The purpose of this Information Technology (IT) Acceptable Use Policy
(AUP) is to provide a framework for use of Essentra’s IT resources. It should
be interpreted such that it has the widest application to include new and
developing technologies and uses, which may not be explicitly referenced.
This Policy supports the IT Security Policy and will assist Essentra
business operations in managing compliance with relevant laws, regulations and
best practice for the protection of Essentra’s information assets, intellectual
property rights and brand reputation.
This Policy entirely replaces and supersedes the End User IT Usage
Policy previously released.
This policy applies to Essentra and all
companies acquired or owned by Essentra plc. It applies to all Essentra employees, contractors and
third-party service providers. It also
applies to people, processes and the technologies that are involved in Essentra
business activities including all information owned by Essentra or entrusted to
Essentra by a third-party (e.g. a supplier or customer).
Essentra handles information relating to its customers, suppliers,
business partners, employees, service providers and business operations. Some
of this information is sensitive (including intellectual property) and requires
specific controls relating to its storage, authorised access or use.
Information may be obtained or become accessible in a variety of ways including
electronic means, hardcopy format and verbally.
This
Acceptable Use Policy is focused on the individual user and gives a set of
basic rules to ensure day to day use of Essentra’s IT system is appropriate and
in accordance with the interests of Essentra.
Compliance with this and all associated policies, standards, procedures
and guidance documents is necessary to safeguard the organisation. This Policy
will assist Essentra in meeting its legal and regulatory obligations and to
maintain business continuity whilst limiting damage to business interests by
preventing security incidents and/or mitigating their impact.
Essentra is required to be compliant with, or align to, various legal
and regulatory standards and codes of practice relative to information security
governance including ensuring that information which Essentra controls is kept
confidential, its integrity is maintained, and it is readily available.
The Board of Essentra plc, our Group
Management Committee and Senior Leadership is fully committed to ensuring the confidentiality,
integrity and availability of information created, collected or entrusted to
us. Essentra shall ensure that
statutory, express and implied legal, regulatory or contractual obligations are
met.
Acceptable use of Essentra IT equipment, resources and information is
generally defined as any activity that may reasonably be expected to be carried
out by an authorised person with legitimate access to those resources for
business purposes.
Essentra IT facilities are provided for business purposes. Limited personal use is permitted within
reason, if such personal use is appropriate and does not create productivity
loss, impact service or resource availability or introduce liability or any
other risk to Essentra, any IT user, data or systems.
Subject to exceptions defined in 2.8, Essentra IT systems must not be
deliberately used by a user for activities having, or likely to have, any of
the following characteristics:
·
intentionally
or unintentionally wasting staff effort or other Essentra resources
·
corrupting,
altering or destroying company or another user’s data without their consent
·
disrupting
the work of other users or the correct functioning of any IT system
·
denying
access to IT systems and its services to other users
·
pursuance
of unauthorised commercial activities related or unrelated to Essentra
· breaking any applicable laws or regulations or Essentra Policies, including transmitting or sharing information in breach of applicable export controls or sanctions laws
Users shall not:
·
introduce
data-interception, password-detecting or similar software or devices to
Essentra IT systems
·
attempt
or provide unauthorised or privileged access to any Essentra IT system
·
connect
any network enabled equipment (wired or wireless) to the corporate network
without authorisation from Essentra IT Change Approval Board (CAB)
·
access
or attempt to access data where the user knows or ought to know that they
should not have access
·
carry
out any computer hacking, reconnaissance or system compromise activities
·
knowingly
introduce or distribute any form of computer virus, malware, remote
access/control, automated script/trigger or other potentially malicious or
destructive software.
·
share
usernames and passwords with other users
·
use
Essentra systems for bulk or spam email campaigns
·
install,
copy or utilise unauthorised software or hardware
·
copy,
reproduce, share or transmit data or information where such activity would
undermine the intellectual property rights or trade secrets of Essentra
·
connect
personal devices to Essentra IT infrastructure unless it is approved as an IT
exception, for business purposes.
Essentra IT systems must not be used directly or indirectly for the
access, download, creation, copying, manipulation, transmission, processing or
storage of:
·
offensive,
obscene or indecent material, including but not limited to images, video audio
and documents
·
unlawful
material, or material that is defamatory, threatening, discriminatory, extremist
or which has the potential to radicalise
·
material
which is subsequently used to facilitate harassment, bullying and/or
victimisation
·
material
which promotes discrimination based on race, gender, religion or belief,
disability, age or sexual orientation
·
material
with the intent to defraud or which is likely to deceive a third party
·
material
which advocates or promotes any unlawful act
·
material
that infringes the intellectual property rights or privacy rights of a third party,
or that is in breach of a legal duty owed to another party
·
material
that is damaging to the Essentra brand or which may bring Essentra into
disrepute.
For the purposes of information security, data loss prevention, policy,
legal or regulatory compliance, Essentra will routinely log, monitor and audit
IT system access and usage, including but not limited to internet, email and
network traffic at any time. Essentra
reserves the right to perform monitoring, incident response and investigative
activities across all IT systems and services at any time without notice.
Any monitoring or audit activity may also capture any private or personal data which users create or store on Essentra’s IT systems and users are encouraged to create separate folders or file structures to store any such data, which then may be easily identifiable as separate to business information. For this reason, users are responsible for exercising good judgement regarding appropriate personal use and compliance with this Policy and all other related Essentra policies.
All Essentra equipment and data, for example laptops and mobile devices including telephones, smartphones, tablet devices, USB memory devices and CDs/DVDs, must be returned to Essentra at termination of contract. In the event that security passcodes are required to access, or factory reset any device, these passcodes must also be provided, or, the device must be returned in a ‘factory reset’ state which permits Essentra to access the device without a passcode.
All Essentra data, records and intellectual property developed or gained during the period of employment remains the property of Essentra and must not be retained beyond termination or reused for any purpose.
·
Information Technology Security Policy
·
General Data Protection Policy
Exceptions to IT security policies, standards, procedures or guidance
documents can only occur with explicit written permission from the IT Security
Team. If the risk caused by the exception is high (or if it is unsure as to
whether the risk is high or not), then the approval can only be provided by the
CIO or CISO.
All employees are required to comply with this Policy and are personally
responsible for doing so. Employees must certify their compliance with the
terms of this Policy when requested.
From time to time, Essentra may require you to take mandatory training
in relation to the terms of this Policy. You must ensure that you complete this
training as required.
If any employee believes that the terms of this Policy are not being
correctly observed, it is their responsibility to raise any concerns with their
line manager. If employees feel that they need to raise the issue outside of
their immediate working environment at any time, Essentra has put in place,
through an independent third party, the ‘Essentra EthicsPoint Helpline’. This
is a confidential call centre manned 24 hours a day by appropriately trained,
local language speaking individuals, and the relevant telephone numbers are
displayed at each Essentra business location.
Alternatively, employees can submit a report through the Essentra
EthicsPoint portal and file a confidential concern. Essentra is committed to
ensuring that employees feel able to raise concerns openly and in good faith
under the ‘Right to Speak’ Policy, without fear of reprisal or retaliation, and
with the support Essentra.
Failure to observe the terms of this Policy – or to cooperate fully with
any investigation by Essentra into alleged or suspected breaches – may result
in any employee’s conduct being subject to review and/or revocation or
limitation of access to any IT system or service. In the most serious cases,
such review may potentially lead to the termination of their employment and/or
result in personal criminal or civil liability.
The Group Management Committee (GMC) and Main
Board shall be accountable for:
·
Ensuring
that appropriate information security, legal and regulatory controls are
identified, implemented, and maintained throughout the company;
·
Approving
and endorsing, through the Chief Information Officer (CIO) and/or Chief
Information Security Officer (CISO), this and all supporting policies,
standards, procedures and guidance documents for use throughout the company;
The Chief Information Officer (CIO) is
responsible for:
·
Establishing
and enforcing information technology acceptable use policies, standards,
procedures and guidance documents;
·
Identifying
unacceptable use-related issues and implementing appropriate remediation
controls necessary to ensure the organisation adheres and aligns with all
mandated legal and regulatory obligations
All managers are responsible within their
function for:
·
Ensuring
staff receive relevant education and awareness with regards to acceptable use
of IT;
·
Ensuring
staff are aware of their responsibilities with regards to acceptable use of IT;
·
Understanding
the assets and services for which they are responsible and the applicable
acceptable use requirements;
·
Assigning
ownership authority and responsibility for information and computer assets;
·
Ensuring
effective use of control mechanisms, including the correct use of user
identities and passwords.
Users including contractors and suppliers
are required to be fully aware and comply with the Essentra’s policies,
standards, procedures and guidelines, legal, regulatory, and contractual
obligations within their area of responsibility, safeguarding all
company-provided IT assets and associated systems and data access, whilst reporting information security
incidents and concerns to their manager and/or the IT Service Desk in a timely
manner.
This Policy will be formally reviewed on an annual basis as a minimum or
if required changes are identified to address one or more of the following:
·
A change
in business activities, which will or could possibly affect the current
operation of the Essentra Information Security Management System and the
relevance of this document;
·
A
change in the way Essentra manages or operates its IT assets and/or their supporting
assets, which may affect the accuracy of this document;
·
An
identified shortcoming in the effectiveness of this Policy, for example because
of a reported IT unacceptable use or security incident, formal review or an
audit finding.
The current version of this Policy, together with its previous versions,
shall be recorded below.
Document
Control |
|
Status: |
Issued - Approved |
Owned by: |
Group CIO |
Version Control |
|||||
Version |
Date |
Author |
Reviewer |
Approver |
Comment |
2.0 |
September 2020 |
CISO |
Group Management
Committee (GMC) |
Board of Directors |
Approved major
version superseding the previous End User IT Usage Policy (AUP v1.0) across
the group. |
2.1 |
October 2020 |
CISO |
Group Management
Committee (GMC) |
Board of Directors |
Added section 2.6 - Actions upon termination of contract. |