• IT Asset Acceptance

  • IT Asset Acceptance

  • IT Asset Acceptance

  • IT Asset Acceptance

  • IT Asset Acceptance

  •  -  -
    Pick a Date
  •  
  • I acknowledge receipt of the following company property (the “property”):

    {AssetInfo}

    I understand that this Property has been loaned to me and is the sole property of the Company. I am expected to exercise due care in my use of this Property and to utilize such Property only for authorized purposes, as outlined in the Company Handbook, incorporated by reference as if set forth fully herein, and below. Negligence in the care of, misuse or damage to the property for any other reason may be considered cause for disciplinary action, up to and including termination.

    I also understand that the Property must be returned to the Company at the time of my separation from employment or when it is requested by my manager or supervisor and that I will be held accountable for any Property issued and not timely returned to the Company. I agree that upon my termination with the Company (whether voluntary or involuntary) or upon request from my manager, I will return all above mentioned assets immediately.  I acknowledge that if I fail to return this Property to the Company within 24 hours of termination or request by management, or if the property is returned in such a condition that repairs or replacement is necessary, such conduct constitutes a breach of this agreement and entitles the Company to pursue all legal remedies. I specifically authorize the Company to deduct the total amount of any such replacement or repair from any amount that the Company owes to me to the extent permitted by law. Any such deduction, however, does not limit or preclude any other remedy the Company may have under the law.  

    The above shall be further governed by the following electronic use specifications:

    Purpose
    To establish a policy for use of the internet and the Company’s electronic communication system. This Policy establishes minimum standards. Executive Management and the IT Manager may supplement this Policy as they need and desire.


    Business Use
    Company’s computer system that allows use of the internet and electronic communication systems are the property of Company and are provided to facilitate the effective and efficient conduct of Company’s business. Users are permitted access to the internet and electronic communication systems to assist in the performance of their jobs.


    Personal Use

    Incidental and occasional personal use of Company’s internet access or electronic communication system is permitted; however, personal use is prohibited if it:

    • Interferes with the user’s productivity or work performance, or with any other employee’s productivity or work performance;
    • Adversely affects the efficient operation of the computer system;
    • Violates any provision of this Policy, the Company’s Employee Handbook, regulation, or law or guideline set forth by Federal, State or local law.

    Additionally, Company’s internet access or electronic communication system is not to be used during working hours. However, use may occur during meal periods.

    No Expectation of Privacy
    No user should have any expectation of privacy in any message, file, image, or data sent, retrieved, or received by use of company’s equipment and/or access. Company has a right to monitor any and all aspects of its computer systems including, but not limited to: sites, location tracking, instant messaging systems, chat groups, news groups visited by users, material downloaded or uploaded by users, and e-mail sent or received by users. Such monitoring may occur at any time, without notice, and without the user’s permission.


    Company Property
    The internet and electronic communication systems and hardware are the property of company. Additionally, all documents composed, and messages and attachments composed, sent, received, or stored on the internet and communications storage systems are and remain the property of company.


    Non-Removal
    Employees may not remove from the premises any hardware, software, sensitive files, or data without prior authorization by management.


    Prohibited Activities
    Certain activities are prohibited when using the internet or electronic communications. These include, but are not limited to:

    • Accessing, downloading, printing, or storing information with sexually explicit content;
    • Downloading or transmitting fraudulent, threatening, obscene, intimidating, defamatory, harassing, discriminatory, or otherwise unlawful messages or images;
    • Installing or downloading computer software, programs, or executable files contrary to policy;
    • Uploading or downloading copyrighted materials or proprietary firm information contrary to policy;
    • Uploading or downloading access-restricted firm information contrary to policy;
    • Sending e-mail using another’s identity, an assumed name, or anonymously;
    • Uploading or downloading applications such as peer-to-peer file-swapping tools and unauthorized enhancements and plug-ins.


    User Responsibility
    The conduct of the users who access the internet or send e-mail containing the company’s domain address may be perceived as reflecting on the character and professionalism of the company. When engaging in such conduct, whether for personal use or official purposes, users are expected to do so in a responsible and professional manner.
    All users are responsible for exercising appropriate care to protect the company’s computer systems against the introduction of viruses. When using the company’s internet access or electronic communications, equipment, and capability, users must:

    • Use the Internet or electronic communications systems only in accordance with company policy;
    • Maintain the conditions of security (including safeguarding passwords) under which they are granted access to such systems;
    • Check with the appropriate IT member prior to downloading or accessing a file or document if the source of the file or other circumstances raises doubts about its safety.


    Violations
    Violations of this policy will be addressed under appropriate disciplinary policy procedures for employees. The appropriate level of disciplinary action will be determined on a case-by-case basis by the company’s management, with sanctions up to or including termination depending on the severity of the offense.
     

    By signing, I attest that I have read, understood and agree to be bound by the above.

     

  •  
  • Should be Empty: