Computer Policy

OVERVIEW

This policy is intended to give direction on purchasing computers (tablets, laptops, desktops), their use, and maintaining a high level of security.

SCOPE

It is expected that regional leaders and location General Managers ensure that they and their teams follow policy on the acquisition, use, and security of all computers.

PURPOSE

There are three primary reasons for implementing and upholding this policy:

1. To ensure we resource our team with suitable computers for our system needs in the most cost-effective manner.
2. To ensure our computers are used by our team in a professional manner.
3. To ensure we take every step possible to minimize cyber security issues that would compromise our systems.

POLICY

1. Purchasing computers

a. Any computer purchase must start with a request from our company VP. An evaluation will be done to determine the need and the allocation of computers. For example, if a new department manager needs a laptop, the best decision may be to re-allocate the GM’s laptop to that department manager and purchase a new one for the GM.

b. Upon purchase approval, the VP will work with his team to determine the best option(s) for purchase and the process for the acquisition. No acquisition is to take place without coordination with VP and Team.

2. Computer use

a. Computers are not to be used for any illegal activities, spam, or discriminatory communication.

b. The company reserves the right to monitor computer use either remotely or by securing the equipment for any reason.

c. Under no circumstance is an employee to remove or tamper with any security feature uploaded onto a computer.

3. Security

a. Prior to use of any newly acquired computer, it must be set up with company required cyber security. That process will be overseen by the VP and his team.

b. As stated above in “Computer use” under no circumstance is an employee to remove or tamper with any security feature uploaded onto a computer.

c. The use of personal computers that have not been approved for company use and/or set up for company use is prohibited.

d. Password access protection is to be maintained on all company computers.

e. No additional security or personal software is to be installed by the employee without approval from VP and Team.

RELATED POLICIES

• See “Social Media” in the company Handbook
• See “Company Property” in the company Handbook

Adopted 05/05/2022