IT Acceptable Use Policy

Summary

This policy defines the “acceptable use” of Seaspan information technology (IT) resources.

The policy is based on the principle that the Seaspan IT environment is provided to support Seaspan business. Uses of Seaspan IT resources that threaten the integrity of Seaspan’s systems, the integrity of non-Seaspan systems, the confidentiality of Seaspan information, privacy, the safety of others, or that are discriminatory, abusive, or harassing, illegal, or that are otherwise in breach of a User’s duties to Seaspan, including but not limited to those set out in Seaspan policies – are forbidden.

By using Seaspan IT resources you assume personal responsibility for appropriate use of such resources and you agree to comply with this policy and other applicable Seaspan policies, as well as applicable Municipal, Provincial and Federal laws and regulations.

Penalties for non-compliance may include disciplinary action including, but not limited to, reprimand, suspension and/or termination of employment. Users should also be aware that their activities may be subject to personal civil or criminal prosecution under applicable laws.

All Users of Seaspan IT resources must review, acknowledge and adhere to the contents of this policy.

A User is defined as anyone who accesses or uses IT resources of Seaspan including but not limited to:

  • All employees on a full-time, part-time or hourly basis
  • All contractors and third-party agents paid directly by the company or another party to work on behalf of the company
  • All employees of partners, customers and visitors of the company

Purpose

The purpose of this policy is to detail the acceptable use of Seaspan IT resources.

Scope

This policy applies to any and all use of Seaspan IT resources. Seaspan IT resources include but are not limited to computer networks, systems, servers, and software, databases, data and information, equipment and devices, email, WiFi, network, and the corporate internet connection. Further examples of the foregoing include but is not limited to electronic documents, information, intellectual property, PC’s, laptops, phones, network, Internet, mobile, cell phones, smartphones, Radio Shop assets, etc., and other IT systems and other resources as they are added to the Seaspan IT environment.

Policy

General Internet Use

General access to the Internet is permitted for Users within the limitations set forth in this policy.

Maintaining a Stable and Hospitable IT Environment

Our aim is to ensure IT resources are available and used for productive business of Seaspan. To ensure our IT resources are used appropriately, safe and stable, employees are prohibited from engaging in any activity with IT resources that may jeopardize or are contrary to appropriate use. In particular, the transmittal, retrieval, or storage of information that is inappropriate for the workplace is not permitted while at work or with Seaspan resources. Prohibited use includes but is not limited to content involving nudity, violence, illegal drugs, sex, or gambling, or involves discriminatory, harassing, disturbing, obscene or pornographic material. In addition to these guidelines, employees should use common sense and consideration for others in deciding which content is appropriate for the workplace. Please also refer to Our Core Values and the Respect in the Workplace Policy.

Unacceptable Use Examples

The following actions constitute unacceptable use of IT resources. This list is not exhaustive, but is included to provide a frame of reference for types of activities that are deemed unacceptable. The User may not use any of the IT resources to:

  • Engage in activity that is illegal under local, provincial, federal, international, or other applicable laws.
  • Engage in any activities that may cause embarrassment, loss of reputation, or other harm to the company.
  • Engage in activities that cause disruption to the workplace environment or create a hostile workplace.
  • Disseminate defamatory, discriminatory, vilifying, sexist, racist, abusive, rude, annoying, insulting, threatening, obscene or otherwise inappropriate messages or media. (See the Respect in the Workplace Policy)
  • Engage in activities that cause an invasion of privacy or are an unauthorized collection, use or disclosure of personal information.
  • Access or attempt to access systems they are not authorized for.
  • Perform any of the following: port scanning, security scanning, network sniffing, keystroke logging, or other IT information gathering techniques when not part of the User’s job function.
  • Reveal personal, system or network passwords to others including, but not limited to, co-workers, family, or friends.
  • Introduce any viruses or malware, or maliciously tamper with any resources.
  • Engage in activities that are of a personal business or for profit nature, including online gambling.
  • Disseminate solicitation communications that make fraudulent offers for products or services.
  • Engage in copyright infringement, install or distribute unlicensed or “pirated” software or any software not approved by the IT group as described below.

Company Information Assets, Malware and Data Loss Prevention

Company Information Assets including, but not limited to Intellectual Property, Confidential Information, Protected A, Controlled Goods, etc. are some of our most important assets. The online criminal community utilizes social engineering, general Web and Social Media sites to deliver malware and carry out schemes designed to damage property or steal company information. To minimize risk related to such threats, adhere to the following guidelines. While these guidelines help to reduce risk, they do not cover all possible threats and are not a substitute for good judgment.

  • Do not use the same passwords for web sites that you use to access company IT resources.
  • Do not follow links or download software from individuals or organizations that you do not know. Report any unexpected or suspicious e-mails or attachments to the IT group immediately.
  • Do not upload, download or transfer software or files to or from the Internet without authorization.
  • If any web or Social Media content looks suspicious in any way, close your browser and do not return to that page.
  • When on Social Media sites encrypt sessions (https) whenever possible. Facebook, Twitter and others support encryption as an option. This is extremely important for roaming Users who connect via public Wi-Fi networks.
  • Limit the usage of File Sharing sites such as Dropbox, etc.- the terms of service of some of these sites give them access to use the information you upload.

Productivity

The IT environment and IT resources are provided to support Seaspan business. Seaspan recognizes that Users have a need, at times, for personal use within the Web and Social Media while at work or using company resources. Therefore, Seaspan allows limited access to non-business Web and Social Media content. It is the responsibility of the User to ensure that personal use does not interfere with Seaspan’s resources, or their or others duties to Seaspan, including but not limited to work quality or productivity.

Software Installation

All software installed on company owned resources must be acquired, purchased and installed by the Seaspan IT group. Only IT group approved, licensed software shall be used on company owned resources. Unapproved products will be uninstalled by the IT group. (See the Allowed Applications Standard)

Technical Controls

This policy is monitored and enforced by technical controls. These technical controls enforce this policy, prevent confidential data loss and block Web-based attacks (malware, phishing, etc.).

Expectation of Privacy

Users should expect no privacy when using Seaspan resources. Such use may include but is not limited to: transmission and storage of files, data, and messages. The company reserves the right to monitor any and all use of the computer network. To ensure compliance with or investigate a breach of company policies or the law, Seaspan may access records, communications and data, monitor use, intercept and review any communications sent or received using Seaspan resources, inspect data, including but not limited to data stored on personal file directories, hard disks, and removable media. Files, data and messages sent from, received by, or stored in or on the company’s resources are the sole property of the company, regardless of the form or content of such files, data and messages.

Bandwidth Usage

Excessive use of company bandwidth or other computer resources is not permitted. Large file downloads or other bandwidth-intensive tasks that may degrade network capacity or performance must be performed during times of low company-wide usage.

Personal Usage

Personal usage of company computer systems is permitted as long as such usage follows pertinent guidelines elsewhere in this document and does not have a detrimental effect on the company or on the User’s job performance. Transferring or saving personal files or media to Seaspan resources is not permitted.

Personal Responsibility

We rely on you to use Seaspan’s IT resources responsibly and in accordance with Seaspan policies. Inappropriate use may result in loss or damage to Seaspan or others. If Seaspan suffers loss or damage related to the inappropriate use of Seaspan’s IT resources, Seaspan may seek to hold the individual User liable. In using Seaspan’s IT resources for anything but Seaspan business in accordance with Seaspan policies, Users are accepting the risk of such liability.

Circumvention of Security

Using company-owned or company-provided computer systems to circumvent any security systems, authentication systems, user-based systems, or escalating privileges is expressly prohibited. Knowingly taking any actions to bypass or circumvent security, or otherwise access information for unauthorized purposes is expressly prohibited.

Audits

Seaspan IT group performs periodic reviews to ensure policy compliance.

Enforcement

This policy will be enforced by Seaspan’s IT Manager. Penalties for non-compliance may include disciplinary action including, but not limited to, reprimand, suspension and/or termination of employment. Individuals’ activities may be subject to personal civil or criminal prosecution under applicable laws.

 
Web Authentication
User Name    
Password