Yanfeng Emp Handbook Proof
receipt of data, including electronic messaging, e-mail, telephone systems, cellular phones/texting and faxing; and the viewing of data. Data includes documents, messages (including texts), information and software programs, generated, modified, stored, transmitted or received through electronic activity. • Employees may use YFAI computing resources during working time for authorized business purposes only. • Employees are expected to report security violations immediately via methods indicated in the corporate Ethics handbook. • Employees must protect sensitive information and agree not to copy licensed software except in accordance with corporate policies, standards, and procedures. • Employees must follow corporate policies, standards, and procedures where it relates to the reproduction, destruction, or modification of information. • Sending, receiving, or displaying text or graphics that may be reasonably construed as obscene is prohibited. • Employees may not download or use software from the Internet or from sources not authorized by management. • Employees are not permitted to share UserIDs and passwords with anyone unless required to do so to troubleshoot a problem with computer equipment or the UserID. • Employees cannot attempt to access resources without obtaining prior permission from management. • Employees will be held accountable for all actions performed under the UserIDs assigned to them. • The Company may monitor electronic activity for system maintenance or for other business reasons with or without notice to users. All messages created, sent, received or stored in the system are and remain the property of YFAI. • YFAI reserves the right to access, review, copy, or delete information on its communications systems, including e-mail messages and disclose such information to any party (inside or outside YFAI) that it deems appropriate. While it is impossible to list all of the circumstances, some examples are the following: o When the Company receives a legal request to disclose e-mail messages;
Page | 40
Made with FlippingBook