Possible Attempted Violation of USTASC Internet Policy
has been detected.

The following sites are prohibited from viewing:

[audio-video], [chat], [dating], [gaming], [jobs], [porn], [shopping], [social], [threats]

 

This is not your personal computer. Go do work.

5-4 Use of Communications and Computer Systems


USTASC's communication and computer systems are intended primarily for business purposes; however limited personal usage is permitted if it does not hinder performance of job duties or violate any other Company policy. This includes the voice mail, e-mail and Internet systems. Users have no legitimate expectation of privacy in regard to their use of the USTASC systems.
USTASC may access the voice mail and e-mail systems and obtain the communications within the systems, including past voice mail and e-mail messages, without notice to users of the system, in the ordinary course of business when the Company deems it appropriate to do so. The reasons for which the Company may obtain such access include, but are not limited to: maintaining the system; preventing or investigating allegations of system abuse or misuse; assuring compliance with software copyright laws; complying with legal and regulatory requests for information; and ensuring that Company operations continue appropriately during the employee's absence.


Further, USTASC may review Internet usage to ensure that such use with Company property, or communications sent via the Internet with Company property, are appropriate. The reasons for which the Company may review employees' use of the Internet with Company property include, but are not limited to: maintaining the system; preventing or investigating allegations of system abuse or misuse; assuring compliance with software copyright laws; complying with legal and regulatory requests for information; and ensuring that Company operations continue appropriately during the employee's absence.
The Company may store electronic communications for a period of time after the communication is created. From time to time, copies of communications may be deleted.


The Company's policies prohibiting harassment, in their entirety, apply to the use of Company's communication and computer systems. No one may use any communication or computer system in a manner that may be construed by others as harassing or offensive based on race, national origin, sex, sexual orientation, age, disability, religious beliefs or any other characteristic protected by federal, state or local law.


Further, since the Company's communication and computer systems are intended for business use, all employees, upon request, must inform management of any private access codes or passwords.
Unauthorized duplication of copyrighted computer software violates the law and is strictly prohibited.
No employee may access, or attempt to obtain access to, another employee's computer systems without appropriate authorization.
Violators of this policy may be subject to disciplinary action, up to and including discharge.