Acceptable Use Policy
Acceptable Use Policy
INTERNAL
Introduction
HM3 Legal takes the subject of information security very seriously. We have a duty to protect the
information that we collect and use for the benefit of the organization and its customers. As an
employee, you will be expected to comply fully with all of the information security policies that are
in place and to report any breaches of these policies of which you may become aware.
This document gives a summary of the main points of the relevant policies and asks you to sign to
say that you have read it and understand its provisions.
Anyone breaching information security policy may be subject to disciplinary action. If a criminal
offence has been committed further action may be taken to assist in the prosecution of the
offender(s).
If you do not understand the implications of this policy or how it may apply to you, please seek
advice from your immediate manager in the first instance.
This control applies to all systems, people and processes that constitute the organization’s
information systems, including board members, directors, employees, suppliers and other third
parties who have access to HM3 Legal systems.
The following policies and procedures are relevant to this document:
Password Policy
Mobile Device Policy
Data Protection Policy
Acceptable Use Policy
Please ensure you have read the following summary of the main points of the organization’s policies
with regard to information security.
-
I acknowledge that my use of HM3 Legal computer and communications systems may be
monitored and/or recorded for lawful purposes.
-
I accept that I am responsible for the use and protection of the user credentials with which I
am provided (user account and password, access token or other items I may be provided
with)
-
I will not use anyone else’s user account and password to access company systems
-
I will not attempt to access any computer system to which I not been given access
-
I will protect any classified material sent, received, stored or processed by me according to
the level of classification assigned to it, including both electronic and paper copies
-
I will ensure that I label any classified material that I create appropriately according to
published guidelines so that it remains appropriately protected
-
I will not send classified information over the Internet via email or other methods unless
appropriate methods (e.g. encryption) have been used to protect it from unauthorised
access
-
I will always ensure that I enter the correct recipient email address(es) so that classified
information is not compromised
-
I will ensure I am not overlooked by unauthorised people when working and will take
appropriate care when printing classified information
-
I will securely store classified printed material and ensure it is correctly destroyed when no
longer needed
-
I will not leave my computer unattended such that unauthorised access can be gained to
information via my account while I am away
-
I will make myself familiar with the organization’s security policies and procedures and any
special instructions relating to my work
-
I will inform my manager immediately if I detect, suspect or witness an incident that may be
a breach of security or if I observe any suspected information security weaknesses in
systems or services
-
I will not attempt to bypass or subvert system security controls or to use them for any
purpose other than that intended
-
I will not remove equipment or information from the organization’s premises without
appropriate approval
-
I will take precautions to protect all computer media and mobile devices when carrying them
outside my organization’s premises (e.g. leaving a laptop unattended or on display in a car
such that it would encourage an opportunist theft)
-
I will not introduce viruses or other malware into the system or network
-
I will not attempt to disable anti-virus protection provided at my computer
-
I will comply with the legal, statutory or contractual obligations that the organization
informs me are relevant to my role
-
I will not configure my personal devices to allow classified data to be processed.
-
I will ensure that any company authorised applications (available via an app-store or
application signing) are kept up to date with the latest version.
-
I will ensure that all software or services no longer required is removed or disabled from all
devices including mobile devices.
-
I will take precautions when adding applications to company systems in the pursuit of
necessary work activity, and will ensure the same applications are removed from the
company systems following the completion of any necessary work activity.
-
In order to access company or client information, I will only install applications that have
been approved by HM3 Legal. These are fundamentally applications which are available via
an app-store or application signing. Approved applications for accessing company or client
information can be found in our Mobile Device Policy
-
I will not install unsigned applications. Note: Usually you have to "root" or "jailbreak" a
device to allow unsigned applications, this is not permitted.
-
On leaving the organization, I will inform my manager prior to departure of any important
information held in my account
Declaration
I have read the information security policy summary above and agree to comply with its contents
and those of any other relevant policies of which the organization may make me aware.
Signature
A copy of this statement should be retained by the User and HM3 Legal