Information Services (IS) Acceptable Use Policy
This policy covers any IS equipment, owned by Mercy Ships or others, which is connected to a Mercy Ships network, situated at a Mercy Ships location or used in the name of Mercy Ships. A ‘User’ is a person operating or using any IS equipment. “IS Equipment” includes but is not limited to computers, networks, printers, and associated peripherals. Additional policies apply to privately owned IS equipment – see Privately Owned IS Equipment Policy. This policy may be supplemented by additional policies relating to the acceptable use of IS equipment at specific Mercy Ships locations – see Navigator for details.
Users must not:
- perform any act that may be construed as illegal or unethical;
- create or transmit defamatory, offensive or harassing material;
- undertake deliberate activities that waste staff effort or networked resources,
- make, download or use copies of copyrighted materials or software, store such copies on a Mercy Ships system, or transmit them over a Mercy Ships network, unless it is covered or permitted under a commercial agreement or other such licence;
- engage in any activity that might be purposefully harmful to systems or to any information stored thereon, such as creating or propagating viruses, disrupting services, damaging files, gaining unauthorised access or modifying a Mercy Ships system or data;
- remove, install, or modify any IS hardware or software, unless given permission by the IS department;
- use a Mercy Ships system or network for commercial purposes in a way which would undermine Mercy Ships’ non-profit status. For example, by performing work for profit with Mercy Ships resources in a manner not authorised by Mercy Ships.
Users must not:
- attempt to circumvent or subvert system or network security measures;
- attempt to gain access to systems or services which are not authorised for their use;
- use another person’s user ID or password;
- conceal their identity when using IS resources, such as masquerading as or impersonating others, or otherwise using a false identity.
- logoff when not using their computer;
- protect their user ID and password from unauthorised use. Users are responsible for all activities connected to or originate from their user ID;
- access only information that is their own, that is publicly available, or to which they have been given authorised access.
Internet and Email
Users must not:
- visit Internet sites that contain obscene, hateful, pornographic or other inappropriate material;
- download excessive quantities of information or files, thereby impeding the speed of the internet connection. Specifically, the use of multi-media streaming, such as video or audio conferencing services may be limited or prohibited at the discretion of the IS Manager, based on the best use of network resources;
- use the internet to play online games;
- use mail or messaging services to harass or intimidate another person, for example, by broadcasting unsolicited messages, or by repeatedly sending unwanted mail.
IS Staff may:
- access user accounts and data for the purposes of support and maintenance;
- remotely observe user workstation activity for the purposes of support and maintenance;
- monitor or log user activity for the purposes of security and auditing.
IS Staff will not:
- divulge to any third party, any information or data acquired in the course of their duties, unless there has been a breach of this policy, in which case staff will inform the appropriate authority. All IS Staff are required to sign a Staff Confidentiality Agreement;
- access user accounts or data except for the purpose of performing their job function as described by their Job Description.