Previous Page  44 / 84 Next Page
Information
Show Menu
Previous Page 44 / 84 Next Page
Page Background

Page | 40

receipt of data, including electronic messaging, e-mail, telephone systems, cellular

phones/texting and faxing; and the viewing of data. Data includes documents,

messages (including texts), information and software programs, generated, modified,

stored, transmitted or received through electronic activity.

Employees may use YFAI computing resources during working time for

authorized business purposes only.

Employees are expected to report security violations immediately via methods

indicated in the corporate Ethics handbook.

Employees must protect sensitive information and agree not to copy licensed

software except in accordance with corporate policies, standards, and

procedures.

Employees must follow corporate policies, standards, and procedures where it

relates to the reproduction, destruction, or modification of information.

Sending, receiving, or displaying text or graphics that may be reasonably

construed as obscene is prohibited.

Employees may not download or use software from the Internet or from sources

not authorized by management.

Employees are not permitted to share UserIDs and passwords with anyone

unless required to do so to troubleshoot a problem with computer equipment or

the UserID.

Employees cannot attempt to access resources without obtaining prior

permission from management.

Employees will be held accountable for all actions performed under the UserIDs

assigned to them.

The Company may monitor electronic activity for system maintenance or for

other business reasons with or without notice to users. All messages created,

sent, received or stored in the system are and remain the property of YFAI.

YFAI reserves the right to access, review, copy, or delete information on its

communications systems, including e-mail messages and disclose such

information to any party (inside or outside YFAI) that it deems appropriate. While

it is impossible to list all of the circumstances, some examples are the following:

o

When the Company receives a legal request to disclose e-mail messages;