KMZ Data Center Acceptable Use Policy

KMZ  intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to KMZ’s established culture of openness, trust and integrity. KMZ  is
committed of protecting  KMZ’s employees, partners and the company from illegal or damaging actions by individuals, either knowingly or unknowingly.
Internet/Intranet/Extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing
electronic mail, WWW browsing, and FTP, are the property of KMZ. These systems are to be used for business purposes in serving the interests of the company, and of our clients and customers in the course of normal operations. Effective security is a team effort involving the participation and support of every KMZ employee and affiliate who deals with information and/or information systems. It is the responsibility of every computer user to know these guidelines, and to conduct their activities accordingly.

This policy applies to the use of information, electronic and computing devices and network resources involved to conduct KMZ business or interact with internal networks and
business systems, whether owned or leased by KMZ, the employee, or a third party. All employees, contractors, consultants, temporary, and other workers at KMZ and its
subsidiaries are responsible for exercising good judgment regarding appropriate use of information, electronic devices, and network resources in accordance with KMZ policies and
standards, and local laws and regulation.
1. KMZ proprietary information stored on electronic and computing devices whether owned or leased by KMZ, the employee or a third party, remains the sole property of KMZ. Everyone must ensure through legal or technical means that proprietary information is protected in accordance with the Data Handling Standard and Data Protection Guidelines
2. You have a responsibility to promptly report the theft, loss or unauthorized disclosure of KMZ proprietary information
3. You may access, use or share KMZ proprietary information only to the extent it is authorized and necessary to fulfil your assigned job duties
4. For security and network maintenance purposes, authorized individuals within KMZ  may monitor equipment, systems and network traffic at any time, per IS’s
Audit Procedure
5. KMZ reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy
6. Accessing data, a server or an account for any purpose other than conducting KMZ
business, even if you have authorized access, is prohibited
7. Introduction of malicious programs into the network or server (e.g., viruses, worms, Trojan horses, e-mail bombs, etc.) is strictly prohibited
8. Using KMZ computing asset to actively engage in procuring or transmitting material that is in violation of harassment or hostile workplace laws in the user’s
local jurisdiction is strictly prohibited
9. Port scanning or security scanning is expressly prohibited unless prior notification to is made
10. Executing any form of network monitoring which will intercept data not intended for the employee’s host, unless this activity is a part of the employee’s normal
job/duty is strictly prohibited
11. Interfering with or denying service to any user other than the employee’s host (for example, denial of service attack) or using any program/script/command, or
sending messages of any kind, with the intent to interfere with, or disable, a user’s terminal session, via any means, locally or via the Internet/Intranet/Extranet is
strictly prohibited
Any employees and concerned personnel that do not adhere to this policy and found to
have violated this policy may be subject to disciplinary action and any third-party partner
company found in violation may have their network connection terminated.