This Acceptable Use Policy is not intended to impose restrictions contrary to our established culture of openness, trust and integrity, but rather to enable you to work in a safe, secure way.
The purpose of this policy is to outline the acceptable use of our systems (which includes laptops, software, email etc) which are primarily for business purposes. Inappropriate use of these systems has the potential to expose Redgate, you and your colleagues to risks including malware attacks, compromise of network systems and services, and legal issues.
These rules are in place to protect our customers, our business, and you as individuals.
This policy applies to all Redgaters, contractors, suppliers and third-party entities that have access to Redgate’s information systems and data.
If you notice a security risk, security weakness or other issue, please contact █████ (internal document - link removed) as soon as possible, even if you think the issue might not be important.
Customer and/or Personal Data (as defined by the GDPR (internal document - link removed)), may only be stored on company supplied/approved equipment or services. If you use your own equipment to access Redgate information, please do so in accordance with the BYOD Policy. Minimise the amount and duration of information stored locally.
Removable media (e.g. USB drives) should not be used unless absolutely necessary. If used, removable media must be encrypted for anything not classified as Public information.
Don’t access or store any data that you don’t have a business need for, especially Personal Data, and take special care when accessing or transferring any Personal Data, regardless of source.
Refer to and abide by our Information Classification Policy (internal document - link removed).
Our devices are for Redgate business. You may use your Redgate device to access personal accounts or services so long as it does not conflict with or affect your work.
You should not conduct work for another business on Redgate devices without authorisation from IT Operations.
In line with our Company values, you may not access or download anything that might be considered offensive, inappropriate or illegal.
Employees should understand that activity on devices may be monitored (e.g. for security or audit purposes) and that access to certain websites may be blocked.
Communications via company-provided services may be logged or archived for auditing or compliance reasons.
Use of Redgate owned technology and systems must be in keeping with our Information Security-related Policies. Failure to do so may result in disciplinary action.