Acceptable Use Practices (AUPs)
The following AUPs apply to all GM Information Resource users:
- Duty to Maintain Security. Information security is the responsibility of every GM employee and any other individual or entity that uses GM Information Resources. Users must ensure a high level of security in their use of GM Information Resources through appropriate behavior, such as maintaining the confidentiality of passwords, and use of encryption tools for GM Classified Information. Users must never engage in any activity that would disrupt or compromise the availability, integrity, or security of GM Information or GM Information Resources, or otherwise result in their misuse. Users must immediately report all possible security breaches to GM management or to the GM Awareline.
- Malicious Code Prevention. Computer codes that perform harmful actions are referred to as malicious code. They include viruses, worms, Trojan horses, and other forms of unwanted activity that can disrupt a single workstation or an entire organization. Users must not compromise the malicious code prevention efforts of the company or create the possibility of malicious code being introduced into GM computing systems. Users must take individual responsibility for protecting GM Information Resources by keeping aware of possible malicious codes and risky behavior, and by following the requirements established in the GM Information Security Policy (GM ISP) and on the GM Intranet. Users must immediately report the existence of any known or suspected malicious code to Information Security and Risk Management (ISRM) at protect.gm.com.
- Handling of GM Secret and Confidential Information. Some records are competitively sensitive and could lead to adverse consequences if disclosed to unauthorized individuals inside or outside of the company. These records must be classified and handled in accordance with the GM ISP. The GM ISP requires encryption for all GM Secret Information.
- Personal Privacy. Users should have no expectation of privacy concerning their use of GM Information Resources, including email, GM-provided computing equipment, the GM Intranet, GM-provided access to the public Internet, or other GM Information Systems, except where applicable law provides differently. The required use of passwords to gain access to GM Information Resources is for GM’s protection; it does not imply that users can expect that their communications and use of those GM Information Resources are private. By their use of these systems, to the extent permitted by applicable law, users specifically consent to having their use and communications monitored and recorded. This consent only applies to the use of GM Information Resources; it does not apply when a user obtains access to the public Internet outside of the GM computing environment or network (i.e., when access is not provided by GM) using their own personal computer.
Comply with Applicable Law. Users must be aware of, and comply with, all applicable laws and regulations governing their use of GM Information Resources, including the laws and regulations pertaining to copyrights, trademarks and patents, and protection of personal data or information, trade secrets, and software. Users must report all known or suspected illegal activity involving GM Information Resources to GM management or to the GM Awareline [http://security.gm.com/investigations/aware.html]. Users are specifically advised that if possible illegal activity is detected, all information related to such activity, including text and images, may be provided to law enforcement authorities or third parties without prior notice to, or consent of, users.
Maintain Professional Demeanor in Communications. Users must maintain a professional demeanor in all internal and external GM communications. Due to the nature of the computing environment, users must be mindful of the possibility that others may regard their communications as authorized or official communications of the company.
Avoid Inappropriate and Offensive Content. Users must never use GM Information Resources to create, access, transmit or store any material that would be considered in bad taste, or otherwise inappropriate, offensive or disrespectful of others (e.g., obscene, lewd, pornographic or violent material, depicted nudity, sexually oriented jokes or cartoons, and/or other offensive material related to age, race, color, sex, religion, national origin, disability or sexual orientation). Users encountering or receiving this kind of material should immediately report the incident to GM management or to the GM Awareline.
Personal Use of GM Information Resources. Occasional, limited personal use of GM Information Resources is permitted if it is reasonable, ethical, and does not interfere with work responsibilities or conflict with local management directives. In general, personal use of GM Information Resources is not appropriate when it interferes with a user’s overall productivity or performance on the job, is in conflict with the GM ISP or other corporate policies and guidelines for employee conduct, places a burden on GM computing and communication resources, or otherwise hinders or prevents GM from conducting its business.
Comply With Rules Governing Remote Access
. Remote access to GM's Information Resources should be limited to activities related to, or in support of, a user's job-related functions. All remote access users must abide by the rules established in the GM ISP.
- Use for Personal Political Activity or Personal Gain is Prohibited.
GM Information Resources must never be used for personal political activity or personal profit or gain.
Potential Consequences for Violation of ILM Policies and AUPs. Failure to comply with the ILM Policies and AUPs may result in the termination of a user's access to GM Information Resources, and, when appropriate, further disciplinary or remedial action, up to and including termination of employment or other contractual relationship. Users may also be held responsible for damages to GM's Information Resources caused by their violation of these AUPs.
Additional information can be found at protect.gm.com
first page | next page »