Office Internet Usage Policy
1. Purpose
This policy outlines the rules for accessing and using the office internet network. Its purpose is to maintain a secure, reliable, and efficient environment for business-related internet usage, while allowing limited access for personal devices through the designated guest network.
2. Scope
This policy applies to all employees, contractors, interns, consultants, and visitors who access the organization’s internet services.
3. Internet Access
Hein+Fricke (Office Network):
- To be used only on company-provided laptops and approved devices.
- Intended strictly for official work-related activities.
- Personal or unauthorized use is not permitted.
H+F_Guest (Guest Network):
- To be used for personal mobile devices and visitor access.
- Bandwidth and access are limited for non-business use.
- Must not be used for illegal, inappropriate, or bandwidth-heavy activities such as torrenting, gaming, or media streaming.
4. Employee Responsibilities
Employees are required to:
- Use the office internet responsibly and only for business purposes on the official network.
- Ensure that personal devices connect exclusively to the H+F_Guest network.
- Avoid downloading or accessing content that may compromise security or disrupt IT systems.
- Immediately report any suspicious network activity or unauthorized access attempts to the IT department.
5. Prohibited Use
The following activities are strictly prohibited on both networks:
- Accessing, sharing, or distributing offensive, illegal, or inappropriate content.
- Unauthorized file sharing, torrenting, or use of peer-to-peer applications.
- Attempting to bypass firewalls, proxies, or other security controls.
- Using the company internet for personal business ventures or external commercial activities.
6. Security & Monitoring
- All traffic on the Hein+Fricke office network is subject to monitoring and logging by the IT department.
- The company may block or restrict websites, services, or applications that pose security risks or affect productivity.
- Violations of this policy may lead to disciplinary actions, including restricted access or escalation to HR.
7. Policy Review
This policy will be reviewed annually and updated as required to align with evolving security standards and organizational requirements.
8. Acknowledgement
All employees must confirm they have read, understood, and agree to comply with this Office Internet Usage Policy by signing the Internet Policy Acknowledgement Form.