CBIMS.Net Acceptable Use Policy
1. Introduction
As user of CBIMS.Net, you will be expected to comply fully with all of the information security policies that are in place and to report any breaches of these policies of which you may become aware.
This document gives a summary of the main points of the relevant policies and asks you to sign to say that you have read it and understand its provisions.
If you do not understand the implications of this policy or how it may apply to you, please seek advice from your immediate manager in the first instance.
This control applies to all systems, people and processes that use CBIMS.Net, including Tulane, DREAMS implementing partners and sub-partners, and other third parties who have access to CBIMS.Net systems.
2. Acceptable Use Policy
Users of CBIMS.Net will be expected to comply fully with all applicable information security policies and to report any known or suspected breaches of these policies. Please ensure all CBIMS.Net users within your organization adhere to the following policies:
- Be responsible for the use and protection of the CBIMS.Net user credentials with which you are provided (user account and password, access token or other items).
- Do not use anyone else’s user account and password to access CBIMS.Net.
- Do not attempt to access any CBIMS.Net features to which you have not been given access.
- Protect any classified material sent, received, stored or processed by you according to the level of classification assigned to it, including both electronic and paper copies.
- Ensure that you label any classified material that you create appropriately according to published guidelines so that it remains appropriately protected.
- Do not send classified information over the Internet via email or other methods unless appropriate methods (e.g. encryption) have been used to protect it from unauthorised access.
- Always ensure that you enter the correct recipient email address(es) so that classified information is not compromised.
- Ensure CBIMS.Net contents are not visible to unauthorised people when working and take appropriate care when printing classified information.
- Ensure that users log out and close their browser when exiting CBIMS.Net.
- CBIMS Mobile users should close the mobile application by swiping it off the screen after use. This ensures that login credentials are required when re-opening.
- Do not leave your computer unattended such that unauthorised access can be gained to information via your account while you are away.
- Familiarize yourself with your respective organization’s security policies and procedures and any special instructions relating to your work.
- Securely store classified printed material and ensure it is correctly destroyed when no longer needed.
- Inform Tulane immediately if you detect, suspect or witness an incident that may be a breach of security or if you observe any suspected information security weaknesses in the CBIMS.Net or CBIMS Mobile systems or services.
- Do not attempt to bypass or subvert system security controls or to use them for any purpose other than that intended.
- Take precautions to protect all computer media and mobile devices when carrying them outside your organization’s premises (e.g. leaving a laptop unattended or on display in a car such that it would encourage an opportunist theft).
- Do not introduce viruses or other malware into the system or network.
- Do not attempt to disable anti-virus protection provided at your computer.
- Comply with the legal, statutory or contractual obligations that are relevant to your role.
- On leaving the organization, inform your organization prior to departure of any important information held in your account.