ICMARC Associate Handbook August 2016

Policy Questions and Enforcement Again, ICMA‑RC’s corporate data and computer resources are vital assets. It’s paramount to the corporation’s continued success that these assets remain secure. If you have any questions regarding ICMA‑RC’s Computer Security Policies, please do not hesitate to contact Information Security Department for clarification. Please report any violations of these policies to Chief Information Security Officer, Vice President of Information Security & Technical Operations. Privacy P P Unless contractual agreements dictate otherwise, messages transmitted over ICMA‑RC computer systems are the property of the corporation, which reserves the right to examine all data stored in or transmitted by these systems. P P Do not use corporate information systems for any purpose other than ICMA‑RC business or as described within this policy or the Associate Handbook . Associates should have no expectation of privacy with respect to personal information stored or sent through ICMA‑RC’s computer systems. P P Use of a personal wireless service at ICMA‑RC headquarters or to conduct ICMA‑RC business is prohibited. P P ICMA‑RC has a legal obligation to protect our associate and customer personal information. Toward that end, the following procedures are in effect:

Confidential — for Internal Use Only

Associate Handbook August 2016 | 101

Made with