IMS Acceptable Use Policy

1. OVERVIEW

This Acceptable Use Policy governs the use and security of all information and computer equipment from Innovative Management Solutions, Inc. It also covers the use of email, the internet, voice and mobile computing equipment.

This policy applies to all information, in any form, relating to the business activities of Innovative Management Solutions, Inc. worldwide, and to all information processed by Innovative Management Solutions, Inc. about other organizations with which it deals.

This policy also covers all IT and information communication facilities operated by or on behalf of Innovative Management Solutions, Inc.

Internet/Intranet/Extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, WWW browsing, and FTP, are the property of Innovative Management Solutions, Inc. These systems are to be used for business purposes in serving the interests of the company, and of our clients and customers in the course of normal operations.

Innovative Management Solutions, Inc. is committed to protecting his employees, partners and the company from illegal or damaging actions by individuals, either knowingly or unknowingly.

It is the responsibility of every Innovative Management Solutions, Inc. computer user to know these guidelines, and to conduct their activities accordingly.

2. PURPOSE

The purpose of this policy is to outline the acceptable use of computer equipment at Innovative Management Solutions, Inc. These rules are in place to protect the employee and Innovative Management Solutions, Inc. Inappropriate use exposes Innovative Management Solutions, Inc. to risks including virus attacks, compromise of network systems and services, and legal issues.

3. SCOPE

This policy applies to employees, contractors, consultants, temporary workers and other workers of Innovative Management Solutions, Inc., including all personnel affiliated with third parties. This policy applies to all equipment owned or leased by Innovative Management Solutions, Inc.

It also applies to the use of information, electronic and computer equipment and network resources to conduct business activities or interact with internal networks and business systems, whether owned or leased by Innovative Management Solutions, Inc., the employee or a third party.

All employees, contractors, consultants, temps and other workers of Innovative Management Solutions, Inc. and its subsidiaries are responsible for exercising judgment with respect to the appropriate use of information, electronic devices and network resources in accordance with Innovative Management Solutions, Inc. policies and standards and local laws and regulations.

4. INDIVIDUAL’S RESPONSIBILITY

Access to the Innovative Management Solutions, Inc. IT systems is controlled by the use of User IDs, passwords and/or tokens. All User IDs and passwords are to be uniquely assigned to named individuals and consequently, individuals are accountable for all actions on the Innovative Management Solutions, Inc. IT systems.

Individuals must not:

• Allow anyone else to use their user ID/token and password on any Innovative Management Solutions, Inc. IT system.

• Leave their user accounts logged in at an unattended and unlocked computer.

• Use someone else’s user ID and password to access Innovative Management Solutions, Inc.’s IT systems.

• Leave their password unprotected (for example writing it down).

• Perform any unauthorised changes to Innovative Management Solutions, Inc.’s IT systems or information.

• Attempt to access data that they are not authorised to use or access.

• Exceed the limits of their authorisation or specific business need to interrogate the system or data.

• Connect any non-Innovative Management Solutions, Inc. authorised device to the [Innovative Management Solutions, Inc. network or IT systems.

• Store Innovative Management Solutions, Inc. data on any non-authorized Innovative Management Solutions, Inc. equipment.

• Give or transfer Innovative Management Solutions, Inc. data or software to any person or organisation. outside Innovative Management Solutions, Inc. without the authority of Innovative Management Solutions, Inc.

Line managers must ensure that individuals receive clear directives on the extent and limits of their authority over computer systems and data.

5. INTERNET AND EMAIL

The use of the internet and email of Innovative Management Solutions, Inc. is intended for professional purposes. Personal use is permitted when it does not affect the individual’s professional performance, does not in any way harm Innovative Management Solutions, Inc., does not violate any terms and conditions of employment and does not place the individual or Innovative Management Solutions, Inc. in violation of legal or other obligations. All individuals are therefore responsible for their actions on the internet as well as when using email systems.

Individuals must not:

• Use the internet or email for harassment or abuse.

• Use blasphemies, obscenities or disrespectful remarks in communications.

• Access, upload, send or receive data (including images) that Innovative Management Solutions, Inc. considers offensive in any way, including sexually explicit, discriminatory, defamatory or libelous material.

• Use the internet or email to make personal gains or run a personal business.

• Use the internet or email to play.

• Use email systems in a way that could affect their reliability or efficiency, for example by distributing chain letters or spam.

• Place on the internet any information relating to Innovative Management Solutions, Inc., modify any information concerning it or express any opinion on Innovative Management Solutions, Inc., unless they are expressly authorized to do so.

• Send sensitive or confidential information that is not protected to the outside world.

• Use of unsolicited email originating from within Innovative Management Solutions, Inc.’s networks of other Internet/Intranet/Extranet service providers on behalf of, or to advertise, any service hosted by Innovative Management Solutions, Inc. or connected via ‘s network.

• Forward business email to personal email accounts (for example, Gmail account).

• Make official commitments by internet or email on behalf of Innovative Management Solutions, Inc., unless authorized to do so.
• Download copyrighted material such as music media files (MP3), films and videos (non-exhaustive list) without appropriate approval.

• In any way, violate copyright, database rights, trademarks or other intellectual property rights.

• Download any software from the internet without the prior consent of the IT department.

• Connect Innovative Management Solutions, Inc. devices to the internet using non-standard connections.

6. GENERAL USE OWNERSHIP

• Innovative Management Solutions, Inc. proprietary information stored on electronic and computing devices whether owned or leased by Innovative Management Solutions, Inc., remains the sole property of Innovative Management Solutions, Inc. You must ensure through legal or technical means that proprietary information is protected in accordance with the data protection standards.

• You have a responsibility to promptly report the theft, loss or unauthorized disclosure of Innovative Management Solutions, Inc. proprietary information.

• You may access, use or share Innovative Management Solutions, Inc. proprietary information only to the extent it is authorized and necessary to perform the tasks assigned to you.

• Employees are responsible for exercising their good judgment as to the reasonableness of personal use. It is the responsibility of each department to develop guidelines for the personal use of internet/intranet/extranet systems. In the absence of such policies, employees should be guided by their department’s policies on personal use and, in the event of uncertainty, should consult their supervisor or manager.

• Innovative Management Solutions, Inc. reserves the right to periodically audit networks and systems to ensure compliance with this policy.

7. BLOGGING AND SOCIAL MEDIA

• Blogging by employees, whether using Innovative Management Solutions, Inc.’s property and systems or personal computer systems, is also subject to the terms and restrictions set out in this policy. The limited and occasional use of Innovative Management Solutions, Inc. systems for blogging is acceptable, provided that it is done in a professional and responsible manner, does not otherwise violate [COMPANY’S NAME] policy, does not prejudice the best interests of Innovative Management Solutions, Inc. and does not interfere with the employee’s normal duties. Blogging from Innovative Management Solutions, Inc.’s systems is also subject to monitoring.

• Employees shall not engage in any blogging that may harm or tarnish the image, reputation and/or goodwill of Innovative Management Solutions, Inc. and/or any of its employees. Employees are also prohibited from making any discriminatory, disparaging, defamatory or harassing comments when blogging.

• Employees may also not attribute personal statements, opinions or beliefs to Innovative Management Solutions, Inc. when engaged in blogging.

8. SECURITY AND PROPRIETARY INFORMATION

• All access to the company’s computer network must be protected by passwords.

• It is prohibited to allow access to another person, either deliberately or by failing to adequately protect the right of access that has been granted.

• All computer devices shall be protected by a password-protected screen saver with an automatic activation function set to 10 minutes or less. You must lock the screen or disconnect when the unit is unattended.

• Messages posted by employees from and Innovative Management Solutions, Inc. email address on forums should contain a warning that the opinions expressed are strictly theirs and not necessarily those of Innovative Management Solutions, Inc.’s, unless the message is posted in the course of professional duties.

• Employees must exercise extreme caution when opening attachments to emails received from unknown senders, which may contain malware.

• Employees must not remove or disable anti-virus software.

• Attempt to remove virus-infected files or clean up an infection, other than by the use of approved Innovative Management Solutions, Inc. anti-virus software and procedures.

9. WORKING OFF SITE

It is accepted that laptops and mobile devices will be taken off-site. The following controls must be applied:

• Working away from the office must be in line with Innovative Management Solutions, Inc. remote working policy.

• Equipment and media taken off-site must not be left unattended in public places and not left in sight in a car.
• Laptops must be carried as hand luggage when travelling.

• Information should be protected against loss or compromise when working remotely. Laptop encryption must be used.

• Particular care should be taken with the use of mobile devices such as laptops, mobile phones, smartphones and tablets. They must be protected at least by a password or a PIN and, where available, encryption.

Mobile Storage Devices

Mobile devices such as USB flash drives, CDs, DVDs and removable hard drives should only be used when network connectivity is not available or there is no other secure method of data transfer. Only authorized Innovative Management Solutions, Inc. mobile storage devices with encryption enabled should be used when transferring sensitive or confidential data.

Software

Employees shall use only software that is authorised by Innovative Management Solutions, Inc. on Innovative Management Solutions, Inc.’s computers. Authorized software must be used in accordance with the software supplier’s licensing agreements. All software on Innovative Management Solutions, Inc. computers must be approved and installed by the Innovative Management Solutions, Inc. IT department.

10. UNACCEPTABLE USE

The following activities are prohibited. Under no circumstances is an employee of Innovative Management Solutions, Inc. authorized to engage in any activity that is illegal under local, state, federal or international law while utilizing Innovative Management Solutions, Inc. owned resources.

The lists below are by no means exhaustive but attempt to provide a framework for activities which fall into the category of unacceptable use.

The following activities are strictly prohibited, with no exceptions:

• Infringements of the rights of any person or company protected by copyright, trade secret, patent or other intellectual property, or by similar laws or regulations, including, but not limited to, the installation or distribution of “pirated” products or other software the use of which is not authorized by Innovative Management Solutions, Inc.

• Unauthorized copying of copyrighted material including, but not limited to, digitization and distribution of photographs from magazines, books or other copyrighted sources, copyrighted music, and the installation of any copyrighted software for which Innovative Management Solutions, Inc. or the end user holds no active license is strictly prohibited.
• Exporting software, technical information, encryption software or technology, in violation of international or regional export control laws, is illegal.

• Introduction of malicious programs into the network or server (e.g., viruses, worms, Trojan horses, email bombs, etc.).

• Making fraudulent offers of products, items, or services originating from any Innovative Management Solutions, Inc. account.

• Making security breaches or disruptions of network communication.

• Executing any form of network monitoring which will intercept data not intended for the employee’s host, unless this activity is a part of the employee’s normal job/duty.

• Circumventing user authentication or security of any host, network or account.

• Interfering with or denying service to any user other than the employee’s host (for example, denial of service attack).

• Using any program/script/command, or sending messages of any kind, with the intent to interfere with, or disable, a user’s terminal session, via any means, locally or via the Internet/Intranet/Extranet.

• Providing information about, or lists of, employees to parties outside Innovative Management Solutions, Inc.