0% found this document useful (0 votes)
42 views5 pages

Internet Usage Policy

Internet Usage Policy

Uploaded by

Kabeer Qureshi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views5 pages

Internet Usage Policy

Internet Usage Policy

Uploaded by

Kabeer Qureshi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

2022

Internet Usage Policy (Version 1.1)

Wateen Telecom
Information Technology

INTERNET USAGE POLICY


ISMS-IT-IUP-v1.1

Owner: Information Technology

Revision History

Updates Date Version Changes Made Approval


Initial Draft 4th February, 2014 1.0 Approved
Document Reviewed 24th May, 2016 1.1 Format Change Approved
Document Reviewed 9th May, 2017 1.1 Approved
Document Reviewed 19th April, 2018 1.1 No change Approved
Document Reviewed 2nd April, 2019 1.1 No change Approved
Document Reviewed 18th May, 2020 1.1 No change Approved
Document Reviewed 10thApril, 2021 1.1 No change Approved
Document Reviewed 23rd May,2022 1.1 No Change Approved

Control: ISO/IEC 27001:2013 A.13


Document Title: Internet Usage Policy (Version 1.1)
Document Number: ISMS-IT-IUP-v1.1
Document Location:

https://wateentelecomlimited.sharepoint.com/sites/it/pm/ISMSIT
Document Review: Document Control Policy (ISMS-DCP-v3.0)
Classification: Restricted
Internet Usage Policy

Contents
1 Overview.............................................................................................................................................3
2 Purpose................................................................................................................................................3
3 Scope...................................................................................................................................................3
4 Policy...................................................................................................................................................3
5 Policy Maintenance Reviews...............................................................................................................4
6 Approvals.............................................................................................................................................5

Page 2 of 5
Internet Usage Policy
1 Overview
The internet usage policy provides employees with rules and guidelines about the appropriate use of Internet on
Enterprise Data Network and Company provided machines. Internet Access is provided primarily to be used for
Wateen Telecom’s business and to develop the skills and knowledge of Wateen Telecom’s workforce to the benefit
of its business objectives. A certain amount of limited and responsible personal use is also permitted.

2 Purpose
Purpose of this policy is to help protect both the business and the employee. The policy will guide users on what sort
of internet traffic is allowed or prohibited. It is also ensured that users should understand the repercussions of
misusing company’s provided internet, thus leading to fewer security risks for the business.

3 Scope
The policy applies to any user who uses Wateen Telecom’s provided internet while connected to Enterprise Data
Network and users who use machines provided by Wateen Telecom. The user could be anyone employed by Wateen
Telecom, any person carrying out work activities on Wateen Telecom occupied premises who is not directly
employed by Wateen Telecom (e.g. students, interns or volunteers), or any person providing a service to Wateen
Telecom under contract (independent contractor, consultant or temporary employee).

4 Policy
 IT infrastructure reserves the right to monitor any user’s internet traffic to analyze it for any signs of possible
incidents, which are imminent threats or violation of internet usage policy. This is done to protect Wateen
Telecom’s resources and data.
 IT infrastructure reserves the right to carry out detailed inspection/investigation if deemed necessary to verify
any potential violation of internet usage policy.
 In an event if IT finds inappropriate activity or violation of internet usage policy, this information may then be
shared with Human Resource for disciplinary action.
Prohibited Internet Usage:
 The users shall not access, transmit, upload, download, display or otherwise disseminate the following types of
material while on the Wateen Telecom Network:
o Adult or obscene content.
o Tasteless, defamatory or offensive content.
o Fraudulent or otherwise unlawful content.
o Content promoting violence, intolerance or hatred.
o Any data capable of being transformed into obscene or indecent images or material.

 The users cannot:


o Intentionally circumvent security mechanisms such as cracking passwords, exploiting system
vulnerabilities, or using systems in excess of granted privileges.
o Intentionally write, compile, copy, propagate, execute, or attempt to introduce any malicious
computer code designed to self-replicate, damage, or otherwise hinder the performance of any
system. Such software may be referred to as malware virus, bacteria, worm or a Trojan Horse.
o Transmit, upload, post or email Wateen Telecom’s confidential data with anyone without prior
authorization.

 In addition to the above, the Internet may not be accessed and used for any of the following:
o Any activity that infringes copyrights.
o Transmission of unsolicited commercial or advertising material.
o Deliberate unauthorized access to facilities or services accessible via the Internet.
o Corrupting or destroying another user’s data.
o Any activity that would violate the privacy of others.
o Any activity that would risk bringing the organization into disrepute.
o Cause damage or disruption to organizational systems.
o Any activity that would violate the laws and regulations of the country.
Page 3 of 5
Internet Usage Policy
o Not to be used for any secondary paid employment or voluntary services.
o Not to be used to run a personal business.
o Using downloading applications like torrents, internet download managers etc. unless authorized.
Authorization for such privileges will require management approval and will be done through
process.

5 Policy Maintenance Reviews


Policy will be reviewed periodically to ensure the appropriateness, the effectiveness and alignment with business
objectives. These reviews may result in the modification, addition or deletion of information from the policy.

Page 4 of 5
Internet Usage Policy
6 Approvals
This Procedure is signed off by the following stakeholders

PREPARED BY:
Waris Butt
Senior Executive
IT Infrastructure

REVIEWED BY:
Gohar Ijaz

Act. Manager IT
Infrastructure

APPROVED BY:
M. Nasir Rao

Head of IT

Page 5 of 5

You might also like