Warranty

Page | 58
Distributing or storing images, text or materials that might be considered indecent,
pornographic, obscene or illegal
Distributing or storing images, text or materials that might be considered
discriminatory, offensive or abusive, in that the context is a personal attack, sexist or
racist, or might be considered as harassment
Accessing copyrighted information in a way that
violates the copyright
Breaking into Bradley Smoker’s or another
organization's system, or unauthorized use of a
password/mailbox
Broadcasting unsolicited personal views on social,
political, religious or other non-business related
matters
Transmitting unsolicited commercial or
advertising material
Undertaking deliberate activities that waste
networked resources
Introducing any form of computer virus or malware into the corporate network
Opening emails and attachments from an unknown source
Disabling security or email scanning software
Passwords
As you are accountable for the activities that occur on any equipment or communication
systems under your username, keep your IDs and passwords confidential and always follow
company security procedures. In addition, be sure to log off or sign out when away from your
computer for lengthy periods of time.
Please also keep in mind that you may only attempt to access company files and data that you
have legitimate access to and only use legal versions of copyright software.
Software downloads and installation
Whether it’s free or not, all software must be approved by IT (through your manager) before it
may be downloaded or installed.
Personal use
We have an obligation to protect our assets, information and the dignity of our employees. In
order to do so, we have the right to access all Bradley Smoker systems, internet access and
files at any time including any personal use. In the event of an investigation for misconduct, all
electronic communications, including social media, may be monitored in compliance with
Federal/Provincial Privacy/Personal Information legislation.
Remember also that when you delete an email, it still exists on the recipient’s system. If you
feel there may be any privacy issues associated with using the company’s systems personally,
we suggest you do not use them for personal use.
The most common way
hackers gain
unauthorized access to
email, networks, etc. is
through users who open
emails and attachments
from an unknown source