Loading...

Dutch Springs Technology and Internet Usage Policy

The Computer and Internet Usage Policy applies to all users (individuals working for the company, including permanent full-time and part-time employees, contract workers, temporary agency workers, business partners, and vendors) who access the Internet through the computing or networking resources of Dutch Springs (herein referred to as "Company," or “The Company”). The Company's users are expected to be familiar with and to comply with this policy, and are also required to use their common sense and exercise their good judgment while using Internet services.

 

Disclaimer

The Internet is a constantly growing worldwide network of computers and servers that contain millions of pages of information. Users are cautioned that many of these pages include offensive, sexually explicit, and inappropriate material. Users are further cautioned that it is difficult to avoid at least some contact with this material while using the Internet. Even innocuous search requests may lead to sites with highly offensive content. Additionally, having an e-mail address on the Internet may lead to receipt of unsolicited e-mail containing offensive content. All users accessing the Internet do so at their own risk and understand and agree that The Company is not responsible for material viewed or downloaded by users from the Internet. To minimize these risks, your use of the Internet at The Company is governed by the following policy:

 

Use of Internet and Company Computers

The Company owns the rights to all data and files in any computer, network, or other information system provided by the Company and to all data and files sent or received using any company system or using the Company's access to any computer network, to the extent that such rights are not superseded by applicable laws relating to intellectual property. All computers assigned to users remain the property of The Company.

The computer network is the property of The Company and is to be used for legitimate business purposes. Users are provided access to the computer network to assist them in the performance of their jobs. Additionally, certain Users may also be provided with access to the Internet through the computer network. All Users have a responsibility to use The Company's computer resources and the Internet in a professional, lawful and ethical manner. Abuse of the computer network or the Internet, may result in disciplinary action, including possible termination, and civil and/or criminal liability.

 

Prohibited Activities. Without prior written permission from The Company, The Company's computer network may not be used to disseminate, view or store commercial or personal advertisements, solicitations, promotions, destructive code (e.g., viruses, Trojan horse programs, etc.) or any other unauthorized materials. Occasional limited appropriate personal use of the computer is permitted if such use does not a) interfere with the User's or any other employee's job performance; b) have an undue effect on the computer or company network's performance; c) or violate any other policies, provisions, guidelines or standards of this agreement or any other of the Company. Further, at all times users are responsible for the professional, ethical and lawful use of the computer system. Personal use of the computer is a privilege that may be revoked at any time.

Employees should not bring personal computers or data storage devices (such as floppy disks, CDs/DVDs, external hard drives, flash drives, "smart" phones, iPods/iPads/iTouch or similar devices, mobile computing devices, or other data storage media) to the workplace or connect them to Company electronic systems without the express written permission of the Company. Any employee bringing a personal computing device, data storage device, or image-recording device onto Company premises thereby gives permission to the Company to inspect the personal computer, data storage device, or image-recording device at any time with personnel of the Company's choosing and to analyze any files, other data, or data storage devices or media that may be within or connectable to the personal computer or image-recording device in question. Employees who do not wish such inspections to be done on their personal computers, data storage devices, or imaging devices should not bring such items to work at all.

 

Illegal Copying. Users may not illegally copy material protected under copyright law or make that material available to others for copying. You are responsible for complying with copyright law and applicable licenses that may apply to software, files, graphics, documents, messages, and other material you wish to download or copy. You may not agree to a license or download any material for which a registration fee is charged without first obtaining the express written permission of the company.

 

Company Materials. Users must not place company material (examples: internal memos, press releases, product or usage information, documentation, etc.) on any mailing list, public news group, or such service. Any posting of materials must be approved by the employee’s manager and the public relations department and will be placed by an authorized individual.

 

Communication Of Trade Secrets. Unless expressly authorized to do so, Users are prohibited from sending, transmitting, or otherwise distributing proprietary information, data, trade secrets or other confidential information belonging to The Company. Unauthorized dissemination of such material may result in severe disciplinary action as well as substantial civil and criminal penalties under State and Federal Economic Espionage laws.

 

Accessing The Internet. To ensure security, avoid the spread of viruses & malware, and to maintain The Company’s Internet Usage Policies or Acceptable Use Policies, employees may only access the Internet through a computer attached to The Company's network and approved Internet firewall or other security device(s). Bypassing The Company's computer network security by accessing the Internet directly by personal connections such as (but not limited to) Cellular Networks, Wimax, modems, or proxy avoidance techniques or by any other means is strictly prohibited.

 

Frivolous Use. Computer resources are not unlimited. Network bandwidth and storage capacity have finite limits, and all Users connected to the network have a responsibility to conserve these resources. As such, Users must not deliberately perform acts that waste computer resources or unfairly monopolize resources to the exclusion of others. These acts include, but are not limited to, sending mass mailings or chain letters, spending excessive amounts of time on the Internet, playing games, engaging in online chat groups or other social media, uploading or downloading large files, accessing streaming audio and/or video files, or otherwise creating unnecessary loads on network traffic associated with non-business-related uses of the Internet.

 

Virus Detection. Files obtained from sources outside The Company, including disks brought from home, files downloaded from the Internet, newsgroups, bulletin boards, or other online services; files attached to e-mail, and files provided by customers or vendors, may contain dangerous computer viruses that may damage The Company's computer network. Users should never download files from the Internet, accept e-mail attachments from outsiders, or use disks from non-Company sources, without first scanning the material with Company-approved virus checking software. If you suspect that a virus has been introduced into The Company's network, notify The Company immediately.

 

No Expectation Of Privacy

Employees are given computers and Internet access to assist them in the performance of their jobs. Employees should have no expectation of privacy in anything they create, store, post, send or receive using the company's computer equipment. The computer network is the property of The Company and may be used only for Company purposes. The Company, in its discretion, will make photographic video recordings at the workplace.

 

Waiver Of Privacy Rights. User expressly waives any right of privacy in anything they create, store, post, send or receive using the company's computer equipment or Internet access. User consents to allow company personnel access to and review of all materials created, stored, sent or received by User through any Company network or Internet connection.

 

Monitoring Of Computer And Internet Usage. The Company has the right to monitor and log and archive any and all aspects of its Computer system including, but not limited to, monitoring Internet sites visited by Users, monitoring chat and newsgroups, monitoring file downloads, and all communications sent and received by users via Email, IM & Chat & Social Networking.

 

Blocking Sites With Inappropriate or Non-Productive Content

The Company has the right to utilize hardware and software that makes it possible to identify and block access to Internet sites containing sexually explicit or other material deemed inappropriate in the workplace such as (but not limited to) Drug; Hacking; Illegal or Unethical; Discrimination; Violence; Proxy Avoidance; Child Abuse; Gambling; Extremist Groups; Pornography; Freeware and Software Downloads; File Sharing and Offsite Storage; etc….

 

Acknowledgement Of Understanding

I have read and agree to comply with the terms of this policy governing the use of The Company's computer network. I understand that violation of this policy may result in disciplinary action, including possible termination and civil and criminal penalties.

First Staff's Name

First Name*

Middle Name

Last Name*
First Staff's Date of Birth*
I certify that I am 14 years of age or older
First Staff's Signature*
Second Staff's Name

First Name*

Middle Name

Last Name*
Second Staff's Date of Birth*
Third Staff's Name

First Name*

Middle Name

Last Name*
Third Staff's Date of Birth*
Fourth Staff's Name

First Name*

Middle Name

Last Name*
Fourth Staff's Date of Birth*
Fifth Staff's Name

First Name*

Middle Name

Last Name*
Fifth Staff's Date of Birth*
Sixth Staff's Name

First Name*

Middle Name

Last Name*
Sixth Staff's Date of Birth*
Seventh Staff's Name

First Name*

Middle Name

Last Name*
Seventh Staff's Date of Birth*
Eighth Staff's Name

First Name*

Middle Name

Last Name*
Eighth Staff's Date of Birth*
Ninth Staff's Name

First Name*

Middle Name

Last Name*
Ninth Staff's Date of Birth*
Tenth Staff's Name

First Name*

Middle Name

Last Name*
Tenth Staff's Date of Birth*
Parent or Guardian's Email Address

Email
A signed copy of this waiver will be sent to the email address you provide.
Parent(s) or court-appointed legal guardian(s) must sign for any participating minor (those under 18 years of age) and agree that they and the minor are subject to all the terms of this document, as set forth above.
Parent or Guardian's Name

First Name*

Middle Name

Last Name*
Parent or Guardian's Date of Birth*
I certify that I am 14 years of age or older
Parent or Guardian's Signature*
Electronic Signature Consent*
By checking here, you are consenting to the use of your electronic signature in lieu of an original signature on paper. You have the right to request that you sign a paper copy instead. By checking here, you are waiving that right. After consent, you may, upon written request to us, obtain a paper copy of an electronic record. No fee will be charged for such copy and no special hardware or software is required to view it. Your agreement to use an electronic signature with us for any documents will continue until such time as you notify us in writing that you no longer wish to use an electronic signature. There is no penalty for withdrawing your consent. You should always make sure that we have a current email address in order to contact you regarding any changes, if necessary.


One or more problems exist. Please scroll up.




Powered by  Smartwaiver