Table of Contents Table of Contents
Previous Page  101 / 105 Next Page
Information
Show Menu
Previous Page 101 / 105 Next Page
Page Background

Confidential — for Internal Use Only

Associate Handbook August 2016 |

101

Policy Questions and Enforcement

Again, ICMA‑RC’s corporate data and computer resources are vital assets. It’s paramount to the corporation’s

continued success that these assets remain secure. If you have any questions regarding ICMA‑RC’s Computer

Security Policies, please do not hesitate to contact Information Security Department for clarification. Please

report any violations of these policies to Chief Information Security Officer, Vice President of Information

Security & Technical Operations.

Privacy

P

P

Unless contractual agreements dictate otherwise, messages transmitted over ICMA‑RC computer systems

are the property of the corporation, which reserves the right to examine all data stored in or transmitted by

these systems.

P

P

Do not use corporate information systems for any purpose other than ICMA‑RC business or as described

within this policy or the

Associate Handbook

. Associates should have no expectation of privacy with respect

to personal information stored or sent through ICMA‑RC’s computer systems.

P

P

Use of a personal wireless service at ICMA‑RC headquarters or to conduct ICMA‑RC business is prohibited.

P

P

ICMA‑RC has a legal obligation to protect our associate and customer personal information. Toward that

end, the following procedures are in effect: