The purpose of this document is to define the employee disciplinary process with respect to IT acceptable use.
Users of this document are all Resolver employees.
If a Resolverite breaches part of our IT acceptable use policy and an incident occurs, it’s serious! We’ll need to investigate and ensure proper action is taken to protect what matters.
STEP ONE: Investigation
STEP TWO: Review IT Acceptable Use and ensure that the Resolverite clearly understands:
Following the outlined discussion, the Information Security Manager will provide:
SITUATION: If a Resolverite breaches part of our IT acceptable use policy a second time or does not fully complete the action plan outlined in step two (2).
STEP THREE: Second Conversation:
SITUATION: a Resolverite breaches part of our IT acceptable use policy a third time or does not fully complete the action plan outlined in steps two (2) or three (3).
This Guiding Principle will be reviewed at least annually to comply with Resolver’s security requirements.
IT Systems Acceptable Use Guiding Principle (1.8) Snapshot:
We trust you to help us take care of our (Resolver, employees, customer, and partner) hardware, networks, systems, and IT services. Compromising our systems in any way is no laughing matter. This Guiding Principle outlines:
Please review this is full.
This document is valid as of August 2023.
The owner of this document is an HR team who must check and, if necessary, update the document at least once a year.
EFFECTIVE ON: August 2023
REVIEW CYCLE: Annual at least and as needed