ANNA STAR CONTRACTING COMPANY provides technology for use in the furtherance of its business objectives. The purpose of this Acceptable Use Policy is to outline acceptable use of technology at the Company and to ensure the risks associated with inappropriate or unauthorized use of computer technology are adequately managed to support business objectives. For the purpose of this Policy, technology includes, but is not limited to, computers, laptops, mobile devices, internet, software, systems, email, telephones, voice mail and related equipment ANNA STAR CONTRACTING COMPANY. Users of Company Technology must respect the rights of other users, respect the integrity of the Company Technology and observe all relevant laws and regulations.
This Policy applies to all employees (including temporary employees) who use the Company Technology . This Policy applies to the Company's unionized and non-unionized workforce. With respect to the Company’s unionized workforce, to the extent that there is any inconsistency between the provisions of this Policy and the applicable collective bargaining agreement, the provisions in the collective bargaining agreement will prevail.
(a) Acceptable Use ANNA STAR CONTRACTING COMPANY provides Company Technology to Users for legitimate business purposes. Users are expected to exercise good judgment and professionalism in the use of all Company Technology. Incidental and occasional personal use of Company Technology is permissible as long as it does not interfere with workplace productivity or the Company's systems or business operations, does not pre-empt any business activity, does not consume more than a trivial amount of the Company's resources and is lawful. Users should be aware that all use of Company Technology is subject to monitoring as described in this Policy and as such, Users have no right to, or expectation of, privacy with respect to their use of Company Technology, subject to applicable laws. Notwithstanding the above, any use of the Company Technology must be in accordance with the provisions set out within this Policy. If a User requires additional clarification about the appropriate use of Company Technology, they should contact their manager. (b) Unacceptable Use The relationship between the Company and its Users is based on trust. This trust must be maintained at all times as it is fundamental to the employment relationship. Users must, at all times, hold themselves to the highest standards of conduct so as to maintain the Company's reputation and the integrity of the Company's business. Users shall not be permitted to use any of the Company Technology to: solicit or recruit for any non-job-related commercial ventures, religious or political causes, outside organizations or other non-job-related solicitations; store, access, transfer, download, upload, communicate or create any fraudulent, harassing, embarrassing, sexually explicit, profane, obscene, intimidating, libelous, slanderous, threatening, abusive, defamatory, or otherwise unlawful or inappropriate materials; download entertainment software or games, or to play games over the Internet; access Internet sites for gambling or any illegal activity; embarrass Company executives, or to jeopardize the Company’s reputation; download, store or transmit material that infringe any copyright, trademark or other proprietary right; post or transmit proprietary or confidential information related to clients, suppliers, vendors, allied parties, or other third parties; post or store Company business-related information on public storage sites; download or distribute pirated software or data; deliberately propagate a virus, malware, or any other malicious program code; send confidential Company information without prior authorization from the proper authoritative manager. Such confidential information includes, but is not limited to, Company copyrighted materials, trade secrets, intellectual property, proprietary financial information, employee information, customer information, or other similar materials that would be considered confidential in nature access, use or disclose Confidential Information without authority; engage in activities for personal gain or a personal business, or for any commercial or business purposes other than Company purposes; perform any scanning or information gathering regarding Company Technology, including the following: port scanning, security scanning, network sniffing, keystroke logging, or other information gathering techniques, when not part of the User’s job function; violate any applicable laws; send unsolicited email; install or use peer-to-peer file-sharing programs or access those types of networks; or use Company resources in a manner that violates applicable laws, including without limitation, those laws relating to discrimination and harassment, privacy, financial disclosure, intellectual property and proprietary information, defamation and criminal laws. Users shall also not be permitted to use the Company Technology to view, access, amend, update, change, collect, use or disclose: (i) any personal information in the Company's possession or control; or (ii) any Confidential Information without proper authorization. Users should report any suspected unacceptable use of Company Technology to their manager. Any User who uses Company Technology for any of these unacceptable uses will be subject to discipline in accordance with this Policy.
The Company maintains ownership over all Company Technology and all data created, sent, received or stored on or using Company Technology. Users should have no expectation of privacy with respect to their use of Company Technology. Subject to compliance with applicable laws, the Company reserves the right to and may from time to time inspect, access, audit, monitor and/or record Users' use of and access to Company Technology and any information accessed, created, modified, stored, sent, received, copied, manipulated or otherwise handled in any way, by or through any Company Technology, at any time, in its sole discretion, without notice to any User. These actions will be performed only as reasonably necessary to ensure compliance with this Policy and other Company policies, to detect and prevent loss or theft of Confidential Information, personal information or other misconduct, to conduct investigations into suspected inappropriate or unlawful activity, to meet legal disclosure and document production requirements, and other compliance requirements.
The Company reserves the right to implement controls in respect of Company Technology at any time in its sole discretion where it is deemed necessary to protect the security of the Company Technology, Confidential Information, personal information or other assets. Users may not block, uninstall or otherwise interfere with such controls. Users must maintain basic controls to prevent Company Technology assets being lost or stolen, potential security breaches, leaking of Confidential Information or personal information and breaches of software licensing agreements. Users must maintain confidentiality and exclusive control of authentication credentials (passwords, tokens, certificates) used to access the Company Technology. Credentials must not be shared with others at any time or left in a place where an unauthorized person might find them. If a User has reason to believe that his/her password has been compromised or discovered by another person, the User must immediately inform his/her manager (if an employee) or [IT?] if any other type of User, and change his/her password immediately. Other basic controls include, but are not limited to: Ensuring that laptops, mobile devices and desktop computers are protected by lock screen passwords of at least 8 characters in length and that screens are set to lock within 10 minutes of inactivity; changing passwords not less than every 30 days. The same password cannot be used more than once every 24 passwords; keeping laptops, mobile devices and portable storage devices and media appropriately secured (e.g. not leaving these items unattended in a vehicle or public place); preventing unauthorized changes being made to the operating system software or configuration of personal computers or mobile devices used to access Company Technology; and not sharing mobile devices used to access Company Technology, or portable media containing Confidential Information or assets, with third parties (including family members); Users must exercise caution when opening attachments or selecting links (these can be contained in electronic messages, blogs or social networks) from unknown sources as these may contain malicious software (also known as malware, examples include viruses, worms and trojans). The Company reserves the right to revoke access to or use of any or all Company Technology any time in its sole discretion. Access to Company Technology will be revoked when a User leaves the Company. All Company Technology resources must be returned to the Company at the end of a User's employment, or at any time Company deems it necessary.
Riyadh, Jubail, Jeddah, Yanbu, Saudi Arabia
info@ana-grp.com
+966558490607