B.10. Privacy and Logging

It is the position of the company that all corporate network resources are owned solely by the company itself. This includes (but is not limited to) e-mail messages, stored files, and network transmissions. The company reserves the right to monitor and/or log all network-based activity. The employee is responsible for surrendering all passwords, files, and/or other required resources if requested to do so in the presence of their direct supervisor and a member of human resources.

Get Mastering™ Network Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.