The purpose of this document is to define the employee disciplinary process with respect to IT acceptable use.
Users of this document are all Resolver employees.
If a Resolverite breaches part of our IT acceptable use policy and an incident occurs, it’s serious! We’ll need to investigate and ensure proper action is taken to protect what matters.
Following the outlined discussion, the Information Security Manager will provide:
a) documentation of the incident, b) action required, c) timeline for action.
SITUATION: If a Resolverite breaches part of our IT acceptable use policy a second time or does not fully complete the action plan outlined in step two (2).
SITUATION: a Resolverite breaches part of our IT acceptable use policy a third time or does not fully complete the action plan outlined in step two (2) or three (3).
This Guiding Principle will be reviewed at least annually to comply with Resolver’s security requirements.
We trust you to help us take care of our (Resolver, employees, customer, and partner) hardware, networks, systems, and IT services. Compromising our systems in any way is no laughing matter. This Guiding Principle outlines:
Please review this in full.
This document is valid as of July 2020.
The owner of this document is an HR team who must check and, if necessary, update the document at least once a year.
EFFECTIVE ON: September 2020
REVIEW CYCLE: Annual at least and as needed
REVIEW, APPROVAL & CHANGE HISTORY: Last time reviewed and approved in August 2020 by Resolver’s Information Technology Security team.