HOME
Computer Use Policy
Computer Use Policy
Computer Use Policy
360 Recruitment – Computer Use Policy
360Rec-12 | 2024-2025
At 360 Recruitment we want to encourage all staff to make effective use of the IT equipment and Internet access provided to support work. However there are some key points which we need all users to observe to ensure safety and security - any breach of these may lead to removal of your access to the equipment or the internet.
Use of 360 Recruitment Equipment
Each item of computer equipment is identified by a serial number and 360 Recruitment asset number and its location recorded. Please do not move any equipment without checking with the Directors.
Users must not make any changes to the configuration of any equipment. This includes copying, altering or deleting of system files, removal of icons, toolbars and the desktop configuration.
Reasonable care should be taken to prevent damage to 360 Recruitment’s equipment, and any fault or damage must be reported to 360 Recruitment staff immediately. Users must avoid eating or drinking while using the equipment as accidental spillage can cause damage.
Any disks, CD’s, DVD’s, or USB devices brought from home or other sources, must be virus-checked by staff prior to usage.
Users must not attempt to access 360 Recruitment’s computer systems other than for the purpose outlined by our staff, all passwords and system information should not be communicated to anyone outside of 360 Recruitment as this could cause a breach of security.
Only authorised members of the company may install or configure IT hardware or software of any type in any 360 Recruitment office.
The consumption of food or drink in the vicinity of 360 Recruitment’s IT equipment must be done so with care and attention
Port scanning or probing of 360 Recruitment IT systems or third party IT systems will not be tolerated.
PC Software
No software of any sort (including games, wallpaper and screen savers other than those pre-installed by 360 Recruitment) must be authorised to use.
Users may not make, acquire, or use unauthorised copies of computer software on 360Recruitment premises or equipment. Any breach of this will be dealt with on an individual basis.
Internet use
Internet browsing will be available for work related purposes e.g. Job search activities, and use of the Internet on each individual PC may be monitored.
Users must not access or view any inappropriate material including sexually explicit, extremist, racist or any other material which could cause offence to other 360 Recruitment users.
Posting messages in inappropriate newsgroups, participation in chat activities, social networking, carrying out financial transactions over the internet and access of sites which encourage criminal activity are not allowed.
The use of downloading applications such as P2P or Torrents or transmission of Data protected by Data Protection Act 1998 or Copyright Law 1998 is prohibited at any time.
Any instances of bullying, intimidating or threatening behaviour via ICT systems will not be tolerated.
Investigation Rights and Privacy
Under the Regulation of Investigatory Powers Act (2000) 360 Recruitment reserves the right to monitor traffic transmitted over its networks or data stored on its PCs or servers. This act also means that in the event of a breach of national security the Government may also be given information relating to personal documents or emails. Similarly, the police may be given access to information contained within our files or transmitted on our network for the purposes of preventing or investigating crime.
The user must comply with all relevant legislation including provisions of the following acts of parliament;
Copyright, Designs and Patents Act 1988
Malicious Communications Act 1988
Computer Misuse Act 1990
Data Protection Act 1998
Human Rights Act 1998
Regulation of Investigatory Powers Act 2000
Freedom of Information Act 2000
Communications Act 2003
Equality Act 2010
Counter Terrorism and Security Act 2015
360 Recruitment – Computer Use Policy
360Rec-12 | 2024-2025
At 360 Recruitment we want to encourage all staff to make effective use of the IT equipment and Internet access provided to support work. However there are some key points which we need all users to observe to ensure safety and security - any breach of these may lead to removal of your access to the equipment or the internet.
Use of 360 Recruitment Equipment
Each item of computer equipment is identified by a serial number and 360 Recruitment asset number and its location recorded. Please do not move any equipment without checking with the Directors.
Users must not make any changes to the configuration of any equipment. This includes copying, altering or deleting of system files, removal of icons, toolbars and the desktop configuration.
Reasonable care should be taken to prevent damage to 360 Recruitment’s equipment, and any fault or damage must be reported to 360 Recruitment staff immediately. Users must avoid eating or drinking while using the equipment as accidental spillage can cause damage.
Any disks, CD’s, DVD’s, or USB devices brought from home or other sources, must be virus-checked by staff prior to usage.
Users must not attempt to access 360 Recruitment’s computer systems other than for the purpose outlined by our staff, all passwords and system information should not be communicated to anyone outside of 360 Recruitment as this could cause a breach of security.
Only authorised members of the company may install or configure IT hardware or software of any type in any 360 Recruitment office.
The consumption of food or drink in the vicinity of 360 Recruitment’s IT equipment must be done so with care and attention
Port scanning or probing of 360 Recruitment IT systems or third party IT systems will not be tolerated.
PC Software
No software of any sort (including games, wallpaper and screen savers other than those pre-installed by 360 Recruitment) must be authorised to use.
Users may not make, acquire, or use unauthorised copies of computer software on 360Recruitment premises or equipment. Any breach of this will be dealt with on an individual basis.
Internet use
Internet browsing will be available for work related purposes e.g. Job search activities, and use of the Internet on each individual PC may be monitored.
Users must not access or view any inappropriate material including sexually explicit, extremist, racist or any other material which could cause offence to other 360 Recruitment users.
Posting messages in inappropriate newsgroups, participation in chat activities, social networking, carrying out financial transactions over the internet and access of sites which encourage criminal activity are not allowed.
The use of downloading applications such as P2P or Torrents or transmission of Data protected by Data Protection Act 1998 or Copyright Law 1998 is prohibited at any time.
Any instances of bullying, intimidating or threatening behaviour via ICT systems will not be tolerated.
Investigation Rights and Privacy
Under the Regulation of Investigatory Powers Act (2000) 360 Recruitment reserves the right to monitor traffic transmitted over its networks or data stored on its PCs or servers. This act also means that in the event of a breach of national security the Government may also be given information relating to personal documents or emails. Similarly, the police may be given access to information contained within our files or transmitted on our network for the purposes of preventing or investigating crime.
The user must comply with all relevant legislation including provisions of the following acts of parliament;
Copyright, Designs and Patents Act 1988
Malicious Communications Act 1988
Computer Misuse Act 1990
Data Protection Act 1998
Human Rights Act 1998
Regulation of Investigatory Powers Act 2000
Freedom of Information Act 2000
Communications Act 2003
Equality Act 2010
Counter Terrorism and Security Act 2015