End User Guidelines
Internal 6 of 8
• Revealing account password and allowing use of account by
unauthorized users. This includes family and other household
members when work is being done at home.
• Using Information Dynamics computing asset to actively engage in
procuring or transmitting material that is in violation of sexual
harassment or hostile workplace laws in the user's local jurisdiction.
• Making fraudulent offers of products, items, or services originating
from any Information Dynamics account.
• Making statements about warranty, expressly or implied, unless it is a
part of normal job duties.
• Effecting security breaches or disruptions of network communication.
Security breaches include, but are not limited to, accessing data of
which the employee is not an intended recipient or logging into a
server or account that the employee is not expressly authorized to
access, unless these duties are within the scope of regular duties. For
purposes of this section, "disruption" includes, but is not limited to,
network sniffing, pinged floods, packet spoofing, denial of service,
and forged routing information for malicious purposes.
• Port scanning or security scanning is expressly prohibited unless
authorized by IT Head.
• Executing any form of network monitoring which will intercept data
not intended for the employee's host, unless this activity is a part of the
employee's normal job/duty is prohibited.
• Circumventing user authentication or security of any host, network or
account.
• Interfering with or denying service to any user other than the
employee's host (for example, denial of service attack).
• Using any program/script/command, or sending messages of any kind,
with the intent to interfere with, or disable, a user's terminal session,
via any means, locally or via the Internet/Intranet/Extranet.
• Providing information about, or lists of, Information Dynamics
employees to parties outside Information Dynamics.
• Use of such software/technique which bypass Information Dynamics’s
Group policy.
8.2.2. Email and Communications Activities
The following activities should be strictly prohibited, with no exceptions:
• Sending unsolicited email messages, including the sending of junk
mail" or other advertising material to individuals who did not
specifically request such material (email spam).
• Any form of harassment via email, telephone or paging, whether
through language, frequency, or size of messages.
• Unauthorized use, or forging, of email header information.