ACCEPTABLE USE POLICY
This policy applies to all persons authorized to access or use electronic resources owned or managed by Penguin Random House LLC ("PRH"). Electronic resources include all PRH-owned, licensed, or managed hardware and software, and use of the PRH network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network.
2.0   ScopeThis policy applies to employees, independent contractors and authorized third parties who are given access to any of PRH’s electronic resources (hereinafter referred to as "Users"). Employees and independent contractors are also governed by and must adhere to PRH's Email and Electronic Resources Policy, available on PRH's Intranet or through Legal.
3.0 General Use and Ownership- 3.1 PRH's electronic resources are provided for business purposes only. Users may only use those resources for which they have authorization.
- 3.2 Users with access to confidential information or sensitive data, including any personal data relating to an identified or identifiable person, are to utilize all appropriate precautions to maintain the accuracy, integrity, confidentiality and security of such information or data and ensure that no unauthorized disclosures occur.
- 3.3 All electronic resources provided by PRH, including individual User accounts, are the property of PRH. Users should be aware that the data they create on PRH's systems remains the property of PRH.
- 3.4 Users must comply with PRH policies, including any password security requirements. Users must make a reasonable effort to protect their passwords and to secure PRH's electronic resources against unauthorized use or access.
- 3.5 Users must have current operating systems security patches installed on all devices used to remotely access PRH's electronic resources.
- 3.6 PRH may monitor all systems and network activity at any time, including the contents and activity of Users' accounts.
- 3.7 Users must notify PRH’s IT Service Desk of any suspected violations of this policy or any other PRH policies, such as unauthorized access attempts.
- 4.1 Violating the rights of any person or PRH protected by copyright, trade secret, patent or other intellectual property, or similar laws or regulations.
- 4.2 Threatening, defaming or harassing others, or otherwise communicating in a manner that is hateful or offensive to recipients or invasive of their privacy.
- 4.3 Accessing (including browsing) any sexually-oriented or other similar "adult" websites.
- 4.4 Engaging in any illegal, harmful or fraudulent activities, including gambling, child pornography, or the offering or dissemination of fraudulent products, services or promotions.
- 4.5 Introducing malicious programs into the network or server (e.g., viruses, worms, Trojan horses, e-mail bombs).
- 4.6 Revealing an individual User account password to others or allowing use of the account by others. This includes family and other household members when work is being done at home.
- 4.7 Effecting security breaches or disruptions of network communication. Security breaches include, but are not limited to, accessing data of which the User is not an intended recipient or logging into a server or account that the User is not expressly authorized to access. For purposes of this section, "disruption" includes, but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information for malicious purposes.
- 4.8 Executing any form of network monitoring or crawling, unless expressly authorized by PRH.
- 4.9 Providing information about, or lists of, PRH's business, employees or customers to parties outside PRH, unless expressly authorized by PRH.
- 4.10 Sending or facilitating the sending of unsolicited mass e-mail or other messages, chain letters, promotions, advertising, or solicitations (e.g., spam), unless expressly authorized by PRH.
- 4.11 Engaging in any other activity that is harmful to or otherwise disrupts PRH's business.
Under no circumstances are Users authorized to engage in any activity that is illegal under local, state, federal or international law while utilizing PRH’s electronic resources. In addition, the following activities are prohibited: