Acceptable Use Policy

SCOPE

This policy details specific requirements for the use of all technological network resources of Cross Border Hub, including platform, website, electronic and hardcopy data, information, and information assets.  Information resources and technology at the Cross Border Hub support our clients to do cross border logistic, and the use of these resources is a privilege that is only for clients of Cross Border Hub.  As a user of these services, you have access to valuable resources, to high risk and/or moderate risk information, and to internal and external networks. Consequently, it is important for you to behave in a responsible, ethical, and legally compliant manner.

In general, acceptable use means ensuring that the information resources and technology of the Cross Border Hub are used for their intended purposes while respecting the rights of other users, the integrity of the physical facilities, the confidentiality of data, information, and information assets, and all pertinent license and contractual agreements.  If a client is found to be in violation of the Acceptable Use Policy, the Cross Border Hub may take disciplinary action, including restriction of and possible loss of network privileges or more serious consequences, up to and including suspension or termination of the services.  Clients may also be subject to federal, state, and local laws governing many interactions that occur on the Cross Border Hub’s networks and on the Internet.  These policies and laws are subject to change as state and federal laws evolve.

PURPOSE

This policy applies to all users of computing resources owned or managed by the Cross Border Hub. Clients covered by the policy include, but not limited to, Cross Border Hub clients, partners, contractors, volunteers, guests or agents of the administration, and external individuals and organizations accessing network services via the Cross Border Hub computing platform.

Computing resources include all Cross Border Hub-owned, licensed, or managed hardware and software, data, information, information assets, Cross Border Hub assigned user accounts, and use of the Cross Border Hub network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network.

These policies apply to technology whether administered by Cross Border Hub.  They apply to personally owned computers and devices connected by wire or wireless to the Cross Border Hub network, and to off-site computers that connect remotely to the Cross Border Hub’s network services.

REQUIREMENTS

In making acceptable use of resources, clients covered by this policy must:

  • Use resources only for authorized purposes.
  • Protect their User IDs, digital / electronic signatures, other authentication and authorization mechanisms, and systems, from unauthorized use.  Each client is responsible for all accesses to Cross Border Hub information resources and technology by their User IDs (login and password), digital/electronic signatures, and other authentication and authorization mechanisms, and for any activity originating from their systems.
  • Access only information to which they have been given authorized access or that is publicly available.
  • Protect electronic and hardcopy data, information, and information assets classified as High-Risk or Moderate-Risk, in compliance with the policies, and applicable Federal, State, and Local laws.
  • Use only legal versions of copyrighted software in compliance with vendor license requirements.
  • Restrict personal use of the Cross Border Hub’s information resources and technology to incidental, intermittent and minor use that is consistent with applicable law.
  • Include only material germane to Cross Border Hub matters in Cross Border Hub electronic communications, such as Platform, SMS, e-mail, Websites, blogs, etc.
  • Transmit / transport confidential data, information, and information assets only via Cross Border Hub approved secured mechanisms.
  • Revise passwords and other authentication and authorization mechanisms suspected of compromise.
  • Report identified or suspected security incidents to the Information Technology (IT) Support/Help Desk.
 
plugins premium WordPress
en_US