So did anyone else get given the job of killjoy?
#1
Scooby Regular
Thread Starter
Join Date: Jan 2002
Posts: 11,581
Likes: 0
Received 0 Likes
on
0 Posts
So did anyone else get given the job of killjoy?
Come 4pm tomorrow, the BBC will be a banned website from our network for a couple of hours
Already killed streaming video...
Already killed streaming video...
#6
Ready to implement just in case, don't really want to stop it until it becomes a problem. What are you guys using to stop this? I have used surfcontrol to stop streaming video from BBC.
Trending Topics
#10
Scooby Regular
Join Date: Oct 2001
Location: Lovely Lancing in West Sussex
Posts: 3,449
Likes: 0
Received 0 Likes
on
0 Posts
It's a sack'able offence here as well, but even that does not stop people.
Saying that, its an empty threat really as getting HR to sack someone for breaching the our IT policy is almost impossible Useless in 1 word.
Darren
Saying that, its an empty threat really as getting HR to sack someone for breaching the our IT policy is almost impossible Useless in 1 word.
Darren
#11
Scooby Regular
Join Date: Oct 2000
Location: Surrey, UK
Posts: 8,384
Likes: 0
Received 0 Likes
on
0 Posts
Originally Posted by darlodge
It's a sack'able offence here as well, but even that does not stop people.
Saying that, its an empty threat really as getting HR to sack someone for breaching the our IT policy is almost impossible Useless in 1 word.
Darren
Saying that, its an empty threat really as getting HR to sack someone for breaching the our IT policy is almost impossible Useless in 1 word.
Darren
#13
Scooby Regular
iTrader: (1)
Join Date: Jul 2004
Location: There on the stair
Posts: 10,208
Likes: 0
Received 0 Likes
on
0 Posts
It's fairly easy to get that policy to stick as long as it worded correctly and you get an explicit agreement to follow it from the staff
Anyone logging into one of our customers p.c.'s has to acknowledge their acceptance every time - there is a link to the T&C's available and the appropriate bodies all agreed to it.
People have lost their jobs over misuse - but you do have to pretty blatant about it
Anyone logging into one of our customers p.c.'s has to acknowledge their acceptance every time - there is a link to the T&C's available and the appropriate bodies all agreed to it.
People have lost their jobs over misuse - but you do have to pretty blatant about it
#16
Scooby Regular
Join Date: Oct 2000
Location: Surrey, UK
Posts: 8,384
Likes: 0
Received 0 Likes
on
0 Posts
Originally Posted by stevencotton
Yeah I know, worth a try, I like SA gossip
#17
Scooby Regular
Join Date: Oct 2001
Location: Lovely Lancing in West Sussex
Posts: 3,449
Likes: 0
Received 0 Likes
on
0 Posts
We get that all the time.
Its when locks get changed on the building or managers offices that raises more eyebrows What valid reason can there be for changing the locks on the entire building after our building manager "leaves"??
Darren
Its when locks get changed on the building or managers offices that raises more eyebrows What valid reason can there be for changing the locks on the entire building after our building manager "leaves"??
Darren
#19
Scooby Regular
Join Date: Oct 2000
Location: Surrey, UK
Posts: 8,384
Likes: 0
Received 0 Likes
on
0 Posts
Originally Posted by stevencotton
Wasn't so long ago we had a full root password change because someone was escorted off of the premises
#20
Scooby Regular
Originally Posted by DrEvil
That can be less entertaining when you aren't allowed to put a mechanism in to do this across all servers in one hit.... logging into 500 odd Unix servers and reseting 'root' is quite dull!
#21
Scooby Regular
Join Date: Jun 2004
Location: Bedfordshire
Posts: 528
Likes: 0
Received 0 Likes
on
0 Posts
#23
Scooby Regular
The banning seems a bit excessive considering this tournament (in particular) happens every 4 years
I appreciate the excessive use of bandwidth incurred by lots of access, however, surely a goodwill gesture - perhaps a public streamed feed to a screen in the office, for example, would be a better move.
How much lost revenue will be incurred through "illness" due to these attitudes?
Dan
I appreciate the excessive use of bandwidth incurred by lots of access, however, surely a goodwill gesture - perhaps a public streamed feed to a screen in the office, for example, would be a better move.
How much lost revenue will be incurred through "illness" due to these attitudes?
Dan
#24
Scooby Regular
Join Date: Oct 2000
Location: Surrey, UK
Posts: 8,384
Likes: 0
Received 0 Likes
on
0 Posts
Originally Posted by ScoobyDoo555
How much lost revenue will be incurred through "illness" due to these attitudes?
Dan
Dan
#25
Scooby Regular
Join Date: Oct 2001
Location: Lovely Lancing in West Sussex
Posts: 3,449
Likes: 0
Received 0 Likes
on
0 Posts
Although we have banned streaming media and the world cup, we have set up TV's for our 24/7 call centres and projectors for the 9-5 Mon-Sun call centres so they don't need it on their desks.
Darren
Darren
#26
Moderator
iTrader: (2)
Yep - we put a Digi TV in our Ops Centre
Kept them happy & we even had a bet on various results - some bugger won @ 33-1 on the Germany/Costa Rica result!
EDIT
Forget the bit about the bet - just seen it was 4-2 at the end
WTF do I know
Kept them happy & we even had a bet on various results - some bugger won @ 33-1 on the Germany/Costa Rica result!
EDIT
Forget the bit about the bet - just seen it was 4-2 at the end
WTF do I know
Last edited by Puff The Magic Wagon!; 09 June 2006 at 10:56 PM.
#28
Scooby Regular
iTrader: (1)
Join Date: Jul 2004
Location: There on the stair
Posts: 10,208
Likes: 0
Received 0 Likes
on
0 Posts
Originally Posted by ScoobyDoo555
The banning seems a bit excessive considering this tournament (in particular) happens every 4 years
I appreciate the excessive use of bandwidth incurred by lots of access, however, surely a goodwill gesture - perhaps a public streamed feed to a screen in the office, for example, would be a better move.
How much lost revenue will be incurred through "illness" due to these attitudes?
Dan
I appreciate the excessive use of bandwidth incurred by lots of access, however, surely a goodwill gesture - perhaps a public streamed feed to a screen in the office, for example, would be a better move.
How much lost revenue will be incurred through "illness" due to these attitudes?
Dan
#29
Scooby Regular
Join Date: Feb 2004
Location: Lanarkshire Gamertag: ScoobyP1
Posts: 396
Likes: 0
Received 0 Likes
on
0 Posts
Originally Posted by Kieran_Burns
It's fairly easy to get that policy to stick as long as it worded correctly and you get an explicit agreement to follow it from the staff
Anyone logging into one of our customers p.c.'s has to acknowledge their acceptance every time - there is a link to the T&C's available and the appropriate bodies all agreed to it.
People have lost their jobs over misuse - but you do have to pretty blatant about it
Anyone logging into one of our customers p.c.'s has to acknowledge their acceptance every time - there is a link to the T&C's available and the appropriate bodies all agreed to it.
People have lost their jobs over misuse - but you do have to pretty blatant about it
#30
Scooby Regular
Join Date: Nov 2001
Location: Leeds - It was 562.4bhp@28psi on Optimax, How much closer to 600 with race fuel and a bigger turbo?
Posts: 15,239
Likes: 0
Received 1 Like
on
1 Post
Hepy,
I did exactly the same for My last company, it was also in the Employee Handbook, and your contract of employment had a section in that you would agree to abide by the 'rules' set out in the handbook.
Also when you first logged into the 'network' it checked to see if you had agreed to the CUP, if not then you got shown the following... if you didnt agree an alert was sent to the information security manager, and you were logged off.
Xxxx relies on its computer network to conduct its business. To ensure that its computer resources are used properly by its employees, independent contractors, and in order to protect Xxxx's corporate reputation, Xxxx has created this Computer Use Policy (the "Policy").
The rules and obligations described apply to all users and all users will be asked to sign the User Acceptance Agreement (attached) which will form part of their Contract of Employment. Violations will be taken very seriously and will result in disciplinary action, including possible dismissal and civil or criminal liability.
It is every employee's duty to use the Company's computer resources responsibly, professionally, ethically and lawfully. Examples of some of the laws, which govern us are:
• Obscene Publications Act
• Sex Discrimination Act
• Race Relations Act
• Copyright Designs & Patents Act
• Computer Misuse Act
• Defamation Act
• Human Rights Act
• Data Protection Act
• Regulation of Investigatory Powers Act
• Telecommunications (Lawful Business Practice) Regulations
• Electronic Communications Act
USE OF THE COMPUTER SYSTEM
The computer system is the property of Xxxx and may be used only for legitimate business purposes. Users are permitted access to the computer system to assist them in the performance of their role.
Duty not to waste computer resources
Users must not deliberately perform acts that waste/monopolise computer resources. These acts include, but are not limited to, sending mass mailing or chain letters, subscribing to non-business related listservers and mailing lists, sending trivial email messages, spending excessive amounts of time on the Internet, visiting non-business related Internet sites, playing games or creating unnecessary network traffic.
Use of the Internet
As with all systems access, authority to use the Internet is required from your line manager. Access will be granted if it is needed as part of your job role. It should only be used for business purposes - please also refer to the section 'Duty not to waste computer resources'.
Sites visited on the Internet are monitored by the Company and any sites which appear to be none business related, unacceptable or undesirable will be blocked by the Systems Department. Any user of the Internet should notify IT Security if they find an unacceptable or undesirable site.
No Expectation of Privacy and Ownership
Users expressly waive any right of personal privacy and ownership in anything they create, store, send or receive on the computer or through the Internet or any other computer network. Employees consent to allow a representative of the company to monitor access and review all materials they create, store, send or receive on the computer or through the Internet or any other network.
Prohibited Activity
Material that is fraudulent, embarrassing, sexually explicit, intimidating, defamatory, inappropriate or unlawful should not be sent by email or on any other form of communication (such as bulletin boards etc), or downloaded from the Internet.
Employees should not:
• Send messages that are defamatory or offensive about Xxxx, its employees, its business or any other organisation or individual.
• Use any company computer system to access unauthorised areas of the system or make any unauthorised modifications to any computer systems.
• Unless expressly authorised by their line Manager, send or transmit any confidential information regarding the Company.
• Without prior written authorisation from the IT Director, which will only be granted if required by their job role, employees should not:
Copy software for use on their home computers
Provide copies of software to any independent contractors or clients of Xxxx or to a third person
Install software on any Xxxx workstations, servers or other devices (including but not limited to "Hand-held Personal Organisers"/"Personal Digital Assistants" [PDAs]).
Download any software from the Internet or other online service to Xxxx workstations, servers or other devices (including but not limited to PDAs)
Reverse engineer, disassemble or decompile any software
Use the company's Internet connection to download games or other entertainment software including screen savers, or to play games over the Internet.
Employees may not copy material protected under copyright law or make material available to others for copying
Attach any devices (including but not limited to PDAs, modems, etc) to company computer networks. Any requests for such installations must be made through the Systems Support Centre.
Move any PCs or other computer equipment.
PASSWORDS
Users are responsible for safe-guarding their passwords for access to the computer system. Individual passwords should not be printed, displayed, stored online or given to others. Employees should not access the computer system with another user's password. Breach of this will be regarded as potential gross misconduct.
SYSTEM ACCESS ACCOUNTS
Accounts for access to any of our computer systems are set up and issued in the name of the user who will be using the account. Users are responsible for any accounts issued in their name. Accounts must not be shared and users should not access the computer systems with another user's account. Any unnamed and / or temporary accounts are the responsibility of the nominated Security Administrator within the relevant user department.
SECURITY INCIDENTS
If any employee notices a breach of these policies or are concerned about any aspect of computer security please contact the IT Security Manager or Group Security Manager (ext xxxx). Any incident, however small, should be notified as soon as possible.
CONTRACTUAL COMMITMENT BY EMAIL
A recipient of an email from an employee of Xxxx could assume that the sender has company authority and take an email as a contractual commitment, for example ordering of services, request for a quote, etc. You must ensure that no mis-understanding occurs and that any legally binding agreements are dealt with through the appropriate channels.
MONITORING
The Company monitors all aspects of its computer system, including, but not limited to, monitoring sites visited by employees on the Internet, reviewing material downloaded or uploaded by users to the Internet and reviewing email sent and received by users.
In addition, email attachments into and out of the company are copied and monitored within the Company. Non-business related mail is referred to the relevant Line Manager for remedial action to be taken which will include disciplinary action up to and including dismissal for gross misconduct in appropriate cases.
Employees who receive email that in their opinion or the opinion of the Company is harassing, intimidating, fraudulent, embarrassing, sexually explicit, defamatory, inappropriate or unlawful are first to speak to the sender concerned to ask them to stop and advise the IT Security Manager or their Line Manager within Xxxx. Alternatively, if the receiver does not wish to do this, she/he should refer the matter to their Line Manager immediately. The mail, however, should not be stored on the PC. It may, however, be printed off the PC only if appropriate and necessary for remedial action.
SUMMARY
Should you have any questions regarding the Xxxx Computer Use Policy, you should refer these to your Line Manager immediately or alternatively your HR Manager or the IT Security Manager.
This policy, along with other related policies and guidelines, is available on the Intranet under Company Policies. Copies can also be obtained from IT Security, Human Resources Department and the Company Noticeboards.
These policies are not intended to restrict your ability to perform your job role within Xxxx, but are in place to protect not only our company data and reputation, but to also protect yourselves, as employees, and our customers.
I did exactly the same for My last company, it was also in the Employee Handbook, and your contract of employment had a section in that you would agree to abide by the 'rules' set out in the handbook.
Also when you first logged into the 'network' it checked to see if you had agreed to the CUP, if not then you got shown the following... if you didnt agree an alert was sent to the information security manager, and you were logged off.
Xxxx relies on its computer network to conduct its business. To ensure that its computer resources are used properly by its employees, independent contractors, and in order to protect Xxxx's corporate reputation, Xxxx has created this Computer Use Policy (the "Policy").
The rules and obligations described apply to all users and all users will be asked to sign the User Acceptance Agreement (attached) which will form part of their Contract of Employment. Violations will be taken very seriously and will result in disciplinary action, including possible dismissal and civil or criminal liability.
It is every employee's duty to use the Company's computer resources responsibly, professionally, ethically and lawfully. Examples of some of the laws, which govern us are:
• Obscene Publications Act
• Sex Discrimination Act
• Race Relations Act
• Copyright Designs & Patents Act
• Computer Misuse Act
• Defamation Act
• Human Rights Act
• Data Protection Act
• Regulation of Investigatory Powers Act
• Telecommunications (Lawful Business Practice) Regulations
• Electronic Communications Act
USE OF THE COMPUTER SYSTEM
The computer system is the property of Xxxx and may be used only for legitimate business purposes. Users are permitted access to the computer system to assist them in the performance of their role.
Duty not to waste computer resources
Users must not deliberately perform acts that waste/monopolise computer resources. These acts include, but are not limited to, sending mass mailing or chain letters, subscribing to non-business related listservers and mailing lists, sending trivial email messages, spending excessive amounts of time on the Internet, visiting non-business related Internet sites, playing games or creating unnecessary network traffic.
Use of the Internet
As with all systems access, authority to use the Internet is required from your line manager. Access will be granted if it is needed as part of your job role. It should only be used for business purposes - please also refer to the section 'Duty not to waste computer resources'.
Sites visited on the Internet are monitored by the Company and any sites which appear to be none business related, unacceptable or undesirable will be blocked by the Systems Department. Any user of the Internet should notify IT Security if they find an unacceptable or undesirable site.
No Expectation of Privacy and Ownership
Users expressly waive any right of personal privacy and ownership in anything they create, store, send or receive on the computer or through the Internet or any other computer network. Employees consent to allow a representative of the company to monitor access and review all materials they create, store, send or receive on the computer or through the Internet or any other network.
Prohibited Activity
Material that is fraudulent, embarrassing, sexually explicit, intimidating, defamatory, inappropriate or unlawful should not be sent by email or on any other form of communication (such as bulletin boards etc), or downloaded from the Internet.
Employees should not:
• Send messages that are defamatory or offensive about Xxxx, its employees, its business or any other organisation or individual.
• Use any company computer system to access unauthorised areas of the system or make any unauthorised modifications to any computer systems.
• Unless expressly authorised by their line Manager, send or transmit any confidential information regarding the Company.
• Without prior written authorisation from the IT Director, which will only be granted if required by their job role, employees should not:
Copy software for use on their home computers
Provide copies of software to any independent contractors or clients of Xxxx or to a third person
Install software on any Xxxx workstations, servers or other devices (including but not limited to "Hand-held Personal Organisers"/"Personal Digital Assistants" [PDAs]).
Download any software from the Internet or other online service to Xxxx workstations, servers or other devices (including but not limited to PDAs)
Reverse engineer, disassemble or decompile any software
Use the company's Internet connection to download games or other entertainment software including screen savers, or to play games over the Internet.
Employees may not copy material protected under copyright law or make material available to others for copying
Attach any devices (including but not limited to PDAs, modems, etc) to company computer networks. Any requests for such installations must be made through the Systems Support Centre.
Move any PCs or other computer equipment.
PASSWORDS
Users are responsible for safe-guarding their passwords for access to the computer system. Individual passwords should not be printed, displayed, stored online or given to others. Employees should not access the computer system with another user's password. Breach of this will be regarded as potential gross misconduct.
SYSTEM ACCESS ACCOUNTS
Accounts for access to any of our computer systems are set up and issued in the name of the user who will be using the account. Users are responsible for any accounts issued in their name. Accounts must not be shared and users should not access the computer systems with another user's account. Any unnamed and / or temporary accounts are the responsibility of the nominated Security Administrator within the relevant user department.
SECURITY INCIDENTS
If any employee notices a breach of these policies or are concerned about any aspect of computer security please contact the IT Security Manager or Group Security Manager (ext xxxx). Any incident, however small, should be notified as soon as possible.
CONTRACTUAL COMMITMENT BY EMAIL
A recipient of an email from an employee of Xxxx could assume that the sender has company authority and take an email as a contractual commitment, for example ordering of services, request for a quote, etc. You must ensure that no mis-understanding occurs and that any legally binding agreements are dealt with through the appropriate channels.
MONITORING
The Company monitors all aspects of its computer system, including, but not limited to, monitoring sites visited by employees on the Internet, reviewing material downloaded or uploaded by users to the Internet and reviewing email sent and received by users.
In addition, email attachments into and out of the company are copied and monitored within the Company. Non-business related mail is referred to the relevant Line Manager for remedial action to be taken which will include disciplinary action up to and including dismissal for gross misconduct in appropriate cases.
Employees who receive email that in their opinion or the opinion of the Company is harassing, intimidating, fraudulent, embarrassing, sexually explicit, defamatory, inappropriate or unlawful are first to speak to the sender concerned to ask them to stop and advise the IT Security Manager or their Line Manager within Xxxx. Alternatively, if the receiver does not wish to do this, she/he should refer the matter to their Line Manager immediately. The mail, however, should not be stored on the PC. It may, however, be printed off the PC only if appropriate and necessary for remedial action.
SUMMARY
Should you have any questions regarding the Xxxx Computer Use Policy, you should refer these to your Line Manager immediately or alternatively your HR Manager or the IT Security Manager.
This policy, along with other related policies and guidelines, is available on the Intranet under Company Policies. Copies can also be obtained from IT Security, Human Resources Department and the Company Noticeboards.
These policies are not intended to restrict your ability to perform your job role within Xxxx, but are in place to protect not only our company data and reputation, but to also protect yourselves, as employees, and our customers.