Skip to main content
Skip table of contents

Acceptable Use Policy

Acceptable Use Policy

Purpose

The purpose of this policy is to outline the acceptable use of computer equipment and systems at SaaSJet. Acceptable use requirements are designed to safeguard sensitive SaaSJet customer data, and to protect the company and its employees. Inappropriate use may expose SaaSJet to legal issues, cyber attacks and breaches, and other risks.

Scope

This policy applies to the use of all company-provided IT resources, regardless of their geographic location, and to all SaaSJet employees and contractors.

Ownership

Pavlo Blozva is responsible for implementing and maintaining this policy.

Policy Statement

SaaSJet assets are primarily intended for business purposes. Users are responsible for exercising good judgment regarding appropriate personal use of company resources, such that this use does not negatively impact SaaSJet in any way.

Acceptable Use

The Acceptable Use Policy outlines the acceptable use of computer equipment and systems at the company.

General Use

General Use and Ownership

  1. SaaSJet proprietary and confidential information stored on electronic and computing devices remains the sole property of SaaSJet, whether the devices themselves are owned by SaaSJet, an employee, or a third party.

  2. Theft, loss, or unauthorized disclosure of SaaSJet proprietary and confidential information must be promptly reported.

  3. Access, use, or sharing of SaaSJet proprietary information is allowed only to the extent it is both authorized and necessary to fulfill the employee's assigned job duties.

  4. Good judgment must be exercised regarding the reasonableness of personal use of company-provided equipment.

  5. Software must be properly licensed, free of malicious code, and authorized, before it is installed on company owned or managed assets.

Security and Proprietary Information

  1. System and individual user passwords must comply with the Authentication and Password Policy.

  2. Providing one's personal access credentials to another individual, either deliberately or through failure to secure its access, is prohibited. Passwords for individual accounts may not be shared.

  3. Employees are required to secure equipment and log out of or lock systems when leaving them unattended for any period of time.

  4. All computing devices must be configured such that their use requires entering a password after at most 15 minutes of inactivity.

  5. Employees must use extreme caution when opening email attachments, particularly those received from unknown senders, as any attachment may contain malware.

  6. Employees must encrypt their devices if asked, and must not interfere with or reduce the level of encryption on their devices.

  7. Employees should install operating system security updates onto their devices if asked to do so, or if prompted by the system's automatic updates feature. Employees should also be proactive about applying system security updates to their devices.

  8. Employees must be mindful of sensitive information, whether on paper or in electronic form. Sensitive information must be secured when left unattended, and kept out of sight when visitors are present.

  9. Electronic media and papers that contain sensitive data must be sanitized or destroyed as soon as that data is no longer needed.

Prohibited use

The following activities and actions are prohibited:

  1. Using SaaSJet information assets in any way that violates international, local law and regulations or violates any SaaSJet policy or procedure.

  2. Accessing data by logging into a server or account that one is not explicitly authorized to access, or accessing data in excess of one's authority.

  3. Copying, moving, or storing sensitive customer information without a strong business need.

  4. Sharing individual user credentials (passwords, private keys, etc.)

  5. Sharing team or group credentials outside the authorized scope of the team or group.

  6. Unauthorized disclosure, release, or transmission of any company data.

  7. Downloading, storing, duplicating, distributing, printing, or otherwise using copyrighted, patented, or trademarked material from any source (including both published works as well as the internet) without the owner's permission.

  8. Taking actions that are intended to breach, or may result in a breach, of SaaSJet or any other company's or individual's security, confidentiality or privacy.

These actions include (but are not limited to):

  1. Taking actions intended to capture information to which the user is not authorized (such as keystroke logging, network sniffing, network mapping, port scanning or vulnerability scanning).

  2. Circumventing, misusing, or exceeding any authentication, privilege, or security mechanism.

  3. Impersonating any person or entity or falsely stating or otherwise misrepresenting affiliation with a person or entity.

  4. Interfering with or denying service to any authorized user or process.

  5. Taking actions meant to disrupt, trick, circumvent, or hide disallowed actions, including (but not limited to) flooding, spoofing, forging data, or causing a denial of service.

  6. Writing, modifying or distributing computer viruses, Trojan horses, worms, or any other form of malicious software.

  7. Taking any action for malicious purposes, or in any manner negatively impacting the interests of the company.

  8. Assisting others in activities which violate this or other SaaSJet policies and standards, or authorizing others to perform such activities.

  9. Introducing honeypots, honeynets, or similar technology to company resources, unless explicitly authorized as part of SaaSJet's security program.

Sanctions Compliance

  1. By accessing or using our services, you represent and warrant that you are not located in, organized under the laws of, or otherwise ordinarily resident in any country or territory that is subject to comprehensive trade sanctions or embargoes imposed by the United States, European Union, United Kingdom, or other applicable jurisdictions, including but not limited to Russia, Iran, North Korea, Syria, and Cuba.

  2. You further agree not to use our services for the benefit of, or on behalf of, any individual or entity that is the subject of such sanctions or is owned or controlled by a sanctioned party.

  3. We reserve the right to refuse service, terminate accounts, or restrict access to our services at our sole discretion if we believe you are in violation of this provision or any applicable sanctions laws.

Approval History

Date

Name

Role

Comment

Pavlo Blozva

CAO

Sanctions Compliance Added

Pavlo Blozva

CAO

Annual Policies Review. No major changes

Pavlo Blozva

CAO

Minor aprroval

Pavlo Blozva

CAO

first editing

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.