Acceptable Use Policy

Effective Date: 24 October 2019

Foreword

Wrench Solutions (P) LTD (WSPL) recommends all concerned to abide by the acceptable use policy when working with facilities and information that belong to WSPL.

Information assets such as networks, the internet, operating systems, software, etc. are to be used by people to meet the business objectives of the organization. It is the responsibility of users of each of these facilities to know the guidelines for using them and to follow the guidelines all the time the facilities are used. This document describes the acceptable use of such facilities.

Introduction

The purpose of this document is to outline the acceptable use of computing infrastructure at WSPL. Everyone who uses the facilities is advised to abide by the guidelines in this policy.

Scope

  1. This policy applies to the use of information, electronic and computing devices to conduct WSPL business or any interaction with such facilities owned/ hired/ subscribed by WSPL.
  2. Any exceptions to the policy are also specified in this document.

Policy

General

  1. All WSPL proprietary information available within the information systems of WSPL is the sole property of WSPL. All users are expected to learn all applicable policies and access only information designated for their access and refrain from accessing any information that is not designated for their access.
  2. All employees, partners, and users of WSPL information systems have the responsibility to report any unauthorized access, loss, theft, or disclosure of WSPL proprietary information.
  3. One may access, use, or share WSPL proprietary information only to the extent authorized and necessary to fulfill the designated job responsibilities.
  4. Everyone accessing WSPL proprietary information When in doubt about access permissions, the information security team is to be contacted for guidelines.
  5. WSPL reserves right to audit information assets, including network traffic and content at any time.
  6. Information systems in WSPL may preserve the content of network traffic for audits in the future. The time and volume of such content capture and the tenure of its retention are at the sole discretion of WSPL.
  7. When human user-operated information systems are unattended for considerably long periods, they shall be automatically switched to inactive mode, to recover from which the currently authenticated user’s password is required.
  8. The internet facility in WSPL is for the sole purpose of WSPL business.
  9. Everyone, before using any service/product offering from WSPL, must read and accept the terms in the privacy policy and this policy.

Specific Scenarios

General

  1. Violations of the rights of any person or company protected by copyright, trade secret, patent or other intellectual property, or similar laws or regulations, including, but not limited to, the installation or distribution of “pirated” or other software products that are not appropriately licensed for use by WSPL is not allowed.
  2. Attempting to access information to which you do not have authorized access is not acceptable.
  3. Accessing information for any purpose other than conducting WSPL business, even if you have authorized access is not acceptable.
  4. Attempting to circumvent security settings/ guidelines is not acceptable.
  5. Disrupting the normal functioning of any IT or other facility in WSLP is not acceptable.
  6. Making information/ assets available to persons who are not authorized to access such assets/ information is not acceptable.
  7. The introduction of malicious programs into the information assets of WSPL (e.g., viruses, worms, Trojan horses, e-mail bombs, etc.) is not acceptable.
  8. Copying and reproducing WSPL information without documented authorization is not acceptable.
  9. Reverse engineering WSPL products is not acceptable.

Emails and communications

  1. Sending unsolicited email messages is not acceptable.
  2. Sending communications with content that is not aligned with the WSPL policies and its best interests is not acceptable.
  3. Expressing personal opinion without clear mention in the content of the communication that it is personal opinion and not of WSPL is not acceptable.
  4. Unauthorized use/ forging of email headers is not acceptable.
  5. Sending/receiving communications on behalf of others without explicit permission is not acceptable.

Internet

  1. The internet facility in WSPL is solely for the purpose of WSPL business and use of it for any other purpose is not acceptable.

Products

  1. WSPL has multiple software products that cater to different needs. All users are required to use the product in accordance with the documented user manuals/ help documents of respective products.
  2. By using the product, you agree to adhere to the licensing terms of the product and this acceptable use policy.
  3. You warrant that you will not reverse engineer any part of the product.
  4. You understand that WSPL may make changes to their product from time to time and you are required to review new versions of products for suitability in your context of use before deciding to use them.
  5. The WSPL software products are tested against malfunctions but no software is free of defects. As a user, you are expected to verify and approve the product behavior in each context of your use of the product. WSPL shall not be responsible for any loss or damage due to undesirable results and malfunctions in the products.

Web Sites

  1. Unless otherwise stated, Wrench Solutions and/or its licensors own the intellectual property rights for all material on the websites owned by WSPL. All intellectual property rights are reserved. You may access this from WSPL websites for your own personal use subject to restrictions set in these terms and conditions. On the information available You must not;
  • Republish/ Redistribute material.
  • Sell, rent, or sub-license material.
  • Reproduce, duplicate, or copy material.
  1. WSPL web sites makes use of cookies. By accessing WSPL web sites, you agreed to use cookies in agreement with the WSPL Privacy Policy.
  2. Many WSPL websites offer opportunity for users to post and exchange opinions and information in certain areas of the websites. WSPL does not filter, edit, publish or review Comments prior to their presence on the website. Comments do not reflect the views and opinions of WSPL, its agents and/or affiliates. Comments reflect the views and opinions of the person posted. Wrench Solutions shall not be liable for the Comments or for any liability, damages or expenses caused and/or suffered as a result of any use of and/or posting of and/or appearance of the Comments on this website. On using the web site, you warrant that you will not post comments that are false, defamatory, libelous, offensive, indecent or unlawful. WSPL reserves all rights to monitor comments and to remove any comments at its sole discretion.
  3. WSPL may change the content and behavior of its website at it’s sole discretion.
  4. The WSPL web sites are tested against malfunctions but no software is free of defects. As a user, you are expected to take necessary precautions against defects such as infected or hacked content. WSPL shall not be responsible for any loss or damage due to defects on the websites.
  5. When providing information on the website, you warrant that the information provided is true to the best of our understanding.

Hyperlinking

  1. Prior written permission from WSPL is required to hyperlink any of its website content from other locations. Organizations that are permitted to hyperlink WSPL website content without prior permissions are only the following:
  • Search Engines
  • Government agencies
  • News organizations
  • Online directory distributors
  1. In all cases, the locations that provide such links must not contain any; (a) content deformative to WSPL business, (b) unlawful content, (c) content with conflict of interest with WSPL business. WSPL shall not be responsible for any consequences due to the hyperlink

Compliance

Assessment

  1. WSPL reserves all rights to measure compliance to this policy through various methods, including but not limited to business tool reports, internal and external audits, network traffic content monitoring and manual observations.

Exceptions

  1. Any exceptions to this policy needs prior approval from the information security team.

Noncompliance

  1. Anyone found to have violated this policy may be subject to appropriate disciplinary action, at the discretion of the WSPL management.