Podcast
Questions and Answers
According to the Employee Internet Usage Policy, employees are advised to use the company's internet connection for which of the following reasons?
According to the Employee Internet Usage Policy, employees are advised to use the company's internet connection for which of the following reasons?
- To perform unauthorized actions.
- To download movies and music.
- To complete their job duties. (correct)
- To invade another person's privacy.
What is considered inappropriate employee internet usage according to the policy?
What is considered inappropriate employee internet usage according to the policy?
- Using strong passwords to log into work-related websites and services.
- Deactivating or configuring settings and firewalls without managerial approval.
- Downloading or uploading obscene, offensive, or illegal material. (correct)
- Visiting potentially dangerous websites that can compromise the safety of the network and computers.
What is included in the definition of 'company equipment' in the computer usage policy?
What is included in the definition of 'company equipment' in the computer usage policy?
- Personal devices of employees.
- Company-issued phones, laptops, tablets, and any other electronic equipment. (correct)
- Software installed on company computers.
- Websites visited by employees on company computers.
What are employees advised to do when they're unsure if a file is safe?
What are employees advised to do when they're unsure if a file is safe?
What are some examples of serious violations that can result in disciplinary action or termination of employment?
What are some examples of serious violations that can result in disciplinary action or termination of employment?
Can employees use their corporate email accounts for personal purposes?
Can employees use their corporate email accounts for personal purposes?
Does the policy allow employees to deactivate or configure settings and firewalls on company computers without managerial approval?
Does the policy allow employees to deactivate or configure settings and firewalls on company computers without managerial approval?