Goal: Ensure efficient use of resources by all individuals.
The purpose of this policy is to identify the proper uses of available resources. While this policy may not mention all systems available at any specific point in time the policy shall apply to any resource provided or paid by us.
Procedure: While working for us, most employees will use or have access to resources including but not limited to telephones, computers, computer software, an electronic mail system, a telephone message recording system, and fax machines. These devices and systems, and the information contained in them, are our property. Except for the telephones, these items are to be used for business purposes only. Telephones may be used for personal reasons in case of emergencies.
Please remember that we reserve the right to access and dispose of any information on these devices as we may see fit at the time. Furthermore, as part of your supervisor and the HIPAA Security manager responsibilities they will be required to access these devices and review and obtain information contained therein on a regular basis.
While access of a device by more that one user is expected, employees shall not assume, nor provide access to these devices or systems, or the information contained therein, to individuals who do not have a business need to know the information. In addition, our policies on equal employment, confidentiality and anti-harassment apply to the use of these devices or systems and the release and access of information on them.
Whenever possible we will use a combination of authentication systems to ensure that only the authorized individuals have access to the proper systems and information needed to accomplish their jobs. If a particular individual needs access to a system or information he/she must contact his/her supervisor and the Security Officer to ensure he/she will be added to the proper authentication systems.
Any violation of this policy may result in disciplinary action, up to and including, termination.