{"id":517,"date":"2014-07-08T08:48:38","date_gmt":"2014-07-08T08:48:38","guid":{"rendered":"https:\/\/www.avacon.org\/blog\/?page_id=517"},"modified":"2014-07-08T09:49:00","modified_gmt":"2014-07-08T09:49:00","slug":"privileged-access-policy","status":"publish","type":"page","link":"https:\/\/www.avacon.org\/blog\/documents\/privileged-access-policy\/","title":{"rendered":"Confidential Information &#038; Privileged Access Policy"},"content":{"rendered":"<h1>CONFIDENTIAL INFORMATION &amp; PRIVILEGED ACCESS POLICY<\/h1>\n<p>The purpose of this <strong>Confidential Information &amp; Privileged Access Policy<\/strong> is to establish the proper use and disclosure of Confidential Information and proper use of Privileged Access that an AvaCon, Inc. (&#8220;AvaCon&#8221;) employee,\u00c2\u00a0staff member, independent contractor, or volunteer\u00c2\u00a0may require to perform certain tasks or duties.<\/p>\n<h2>DEFINITIONS<\/h2>\n<p>1. \u00c2\u00a0\u00e2\u20ac\u0153<strong>Confidential Information<\/strong>\u00e2\u20ac\u009d shall include but not be limited to:<\/p>\n<p style=\"padding-left: 30px;\">a. Information relating to AvaCon&#8217;s\u00c2\u00a0financial, personnel, or operational matters;<\/p>\n<p style=\"padding-left: 30px;\">b. Information relating to AvaCon&#8217;s clients, customers, donors, sponsors, employees, volunteers, or business associates;<\/p>\n<p style=\"padding-left: 30px;\">c. Trade secrets, know-how, techniques, processes, methods, ideas, technical data and specifications, patents, patentable methods, testing methods, research and development activities, computer programs and designs;<\/p>\n<p style=\"padding-left: 30px;\">d. Contracts, production plans, sales and marketing plans, business plans;<\/p>\n<p style=\"padding-left: 30px;\">e. And all information not generally known outside of \u00c2\u00a0AvaCon regarding the\u00c2\u00a0organization\u00c2\u00a0and its business, regardless of whether such information is in written, oral, electronic, digital, or other form and regardless of whether the information originates from AvaCon\u00c2\u00a0or AvaCon&#8217;s\u00c2\u00a0agents.<\/p>\n<p>2. \u00c2\u00a0&#8220;<strong>Privileged Access<\/strong>&#8221; is defined as\u00c2\u00a0access that enables an individual to take action which may affect computing systems, network communication, or the accounts, files, data, or processes of other users. \u00c2\u00a0Privileged Access is typically granted to system administrators, network administrators, staff performing system or computer account administration, or other such employees, contractors, volunteers, or consultants whose job duties require special privileges over a computing system or network.<\/p>\n<h2>OBLIGATION OF CONFIDENTIALITY<\/h2>\n<p>Except as may be required for the performance of your assigned duties, or unless specifically authorized in writing by AvaCon, you\u00c2\u00a0agree that you\u00c2\u00a0shall not use or disclose any Confidential Information owned, controlled, or licensed by AvaCon\u00c2\u00a0for your\u00c2\u00a0or others\u00e2\u20ac\u2122 benefit, either during or after your\u00c2\u00a0service or employment.<\/p>\n<h2>OBLIGATION OF RESPONSIBLE &amp; AUTHORIZED-ONLY PRIVILEGED ACCESS<\/h2>\n<p>As a condition of receiving\u00c2\u00a0Privileged Access if your assigned job duties require such access, you also agree that, pending security approval:<\/p>\n<p>1. Privileged Access may only be used to perform assigned job duties.<\/p>\n<p>2. Privileged Access is granted only to authorized individuals.<\/p>\n<p>3. If methods other than using Privileged Access will accomplish an action, those other methods must be used unless the burden of time or other resources required clearly justifies using Privileged Access.<\/p>\n<p>4. Privileged Access may be used to perform standard system-related duties only on machines and networks whose responsibility is part of assigned job duties.<\/p>\n<p>5. Privileged Access may be used to grant, change, or deny resources, access, or privilege to another individual only for authorized account management activities or under exceptional circumstances.<\/p>\n<p>6. Such actions must follow all applicable existing organizational guidelines and procedures.<\/p>\n<p>7. In the absence of compelling circumstances, the investigation of information in, or suspension of, an account suspected to be compromised should be delayed until normal business hours to allow appropriate authorization and\/or notification activities.<\/p>\n<p>8. In all cases, access to other individuals&#8217; electronic information shall be limited to the least perusal of contents and the least action necessary to resolve a situation.<\/p>\n<p>9. Individuals with Privileged Access shall take all necessary and reasonable precautions to protect the confidentiality of information encountered in the performance of their duties.<\/p>\n<p>You also agree that the failure to use good judgment or abuse of AvaCon\u00e2\u20ac\u2122s Confidential Information &amp; Privileged Access Policy\u00c2\u00a0may result in suspension of privileges or disciplinary action, up to and including termination.<\/p>\n<h2>RETURN OF MATERIALS AND\u00c2\u00a0SUSPENSION OF\u00c2\u00a0PRIVILEGED ACCESS ACCOUNTS<\/h2>\n<p>Any and all materials containing Confidential Information owned by, controlled by, or licensed to AvaCon\u00c2\u00a0and given to you\u00c2\u00a0to perform your\u00c2\u00a0duties, shall be returned to AvaCon, including copies, access to, or any other digital or tangible embodiment of such materials, upon the termination of the position for whatever reason or at the request of AvaCon. \u00c2\u00a0The return of any such materials shall take place within twenty-four (24) hours of notice of termination or upon the request of AvaCon, whichever comes first.<\/p>\n<p>In addition, you agree that, upon notice\u00c2\u00a0of termination for whatever reason or at the direction of AvaCon, your authorized access to records and computer systems is immediately revoked and you will refrain from using any Privileged Access accounts or system access, even if your Privileged Access accounts have not yet been technically suspended or revoked. \u00c2\u00a0Any employee,\u00c2\u00a0staff member, independent contractor, or volunteer\u00c2\u00a0who intentionally obtains unauthorized access to records or computer systems\u00c2\u00a0may\u00c2\u00a0be subject to <span style=\"color: #000000;\">criminal prosecution and civil penalties<\/span>.<\/p>\n<h2>INDEMNIFICATION<\/h2>\n<p>In the event that\u00c2\u00a0you\u00c2\u00a0improperly use or disclose Confidential Information owned by, controlled by, or licensed to AvaCon or improperly use Privileged Access\u00c2\u00a0that infringes the rights of any third party, you\u00c2\u00a0agree to indemnify, defend and hold harmless AvaCon\u00c2\u00a0from and against any loss, damage, costs, liability and expenses (including reasonable attorneys\u00e2\u20ac\u2122 fees) arising from or out of any third-party action or claim that your\u00c2\u00a0improper use or disclosure of the Confidential Information or improper use of Privileged Access infringes the rights of such third party.<\/p>\n<p>The terms of this agreement shall remain in effect even after you leave your position\u00c2\u00a0or are terminated from a staff or volunteer position with AvaCon. Any agreement you make\u00c2\u00a0with other entities or agents relating to use or access to AvaCon&#8217;s Confidential Information or use of Privileged Access under the terms of this agreement must be consistent with these terms, and no such agreement with another party can abrogate, nullify, void or modify this agreement.<\/p>\n<p>I have read and understood this agreement and I am over the age of 18.<\/p>\n<div class=\"frm_forms  with_frm_style frm_style_formidable-style\" id=\"frm_form_21_container\" >\n<form enctype=\"multipart\/form-data\" method=\"post\" class=\"frm-show-form \" id=\"form_hjuwu24\" >\n<div class=\"frm_form_fields \">\n<fieldset>\n\r\n<div class=\"frm_fields_container\">\n<input type=\"hidden\" name=\"frm_action\" value=\"create\" \/>\n<input type=\"hidden\" name=\"form_id\" value=\"21\" \/>\n<input type=\"hidden\" name=\"frm_hide_fields_21\" id=\"frm_hide_fields_21\" value=\"\" \/>\n<input type=\"hidden\" name=\"form_key\" value=\"hjuwu24\" \/>\n<input type=\"hidden\" name=\"item_meta[0]\" value=\"\" \/>\n<input type=\"hidden\" id=\"frm_submit_entry_21\" name=\"frm_submit_entry_21\" value=\"8a799276ff\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/blog\/wp-json\/wp\/v2\/pages\/517\" \/><div id=\"frm_field_635_container\" class=\"frm_form_field form-field  frm_required_field frm_top_container\">\r\n    <label for=\"field_ee0hbk5\" class=\"frm_primary_label\">Signed By\r\n        <span class=\"frm_required\">*<\/span>\r\n    <\/label>\r\n    <input type=\"text\" id=\"field_ee0hbk5\" name=\"item_meta[635]\" value=\"\"  data-reqmsg=\"Signed By cannot be blank.\" aria-required=\"true\" data-invmsg=\"Signed By is invalid\" aria-invalid=\"false\"   aria-describedby=\"frm_desc_field_ee0hbk5\"\/>\r\n    <div id=\"frm_desc_field_ee0hbk5\" class=\"frm_description\">Please enter your first and last real name.<\/div>\r\n    \r\n<\/div>\n<div id=\"frm_field_636_container\" class=\"frm_form_field form-field  frm_required_field frm_top_container\">\r\n    <label for=\"field_scctfp5\" class=\"frm_primary_label\">Email Address\r\n        <span class=\"frm_required\">*<\/span>\r\n    <\/label>\r\n    <input type=\"email\" id=\"field_scctfp5\" name=\"item_meta[636]\" value=\"\"  data-reqmsg=\"Email Address cannot be blank.\" aria-required=\"true\" data-invmsg=\"Email Address is invalid\" aria-invalid=\"false\"   aria-describedby=\"frm_desc_field_scctfp5\"\/>\r\n    <div id=\"frm_desc_field_scctfp5\" class=\"frm_description\">Please enter your email address.<\/div>\r\n    \r\n<\/div>\n<div id=\"frm_field_637_container\" class=\"frm_form_field form-field  frm_required_field frm_top_container\">\r\n    <label for=\"field_hruacv5\" class=\"frm_primary_label\">Date\r\n        <span class=\"frm_required\">*<\/span>\r\n    <\/label>\r\n    <input type=\"text\" id=\"field_hruacv5\" name=\"item_meta[637]\" value=\"\"  style=\"width:90px\" maxlength=\"10\" data-reqmsg=\"Date cannot be blank.\" aria-required=\"true\" data-invmsg=\"Date is invalid\" class=\"auto_width\" aria-invalid=\"false\"  \/>\r\n    \r\n    \r\n<\/div>\n\t<input type=\"hidden\" name=\"item_key\" value=\"\" \/>\n\t\t\t<div id=\"frm_field_703_container\">\n\t\t\t<label for=\"field_td8cn\" >\n\t\t\t\tIf you are human, leave this field blank.\t\t\t<\/label>\n\t\t\t<input  id=\"field_td8cn\" type=\"text\" class=\"frm_form_field form-field frm_verify\" name=\"item_meta[703]\" value=\"\"  \/>\n\t\t<\/div>\n\t\t<input name=\"frm_state\" type=\"hidden\" value=\"as7lhoZmdL4RjPK9tgyaKTwVQ8vxGrlTsuAyoHg3pdY=\" \/><div class=\"frm_submit\">\r\n\r\n<input type=\"submit\" value=\"Submit\"  \/>\r\n<img decoding=\"async\" class=\"frm_ajax_loading\" src=\"https:\/\/www.avacon.org\/blog\/wp-content\/plugins\/formidable\/images\/ajax_loader.gif\" alt=\"Sending\" style=\"visibility:hidden;\" \/>\r\n\r\n<\/div><\/div>\n<\/fieldset>\n<\/div>\n\n<p style=\"display: none !important;\" class=\"akismet-fields-container\" data-prefix=\"ak_\"><label>&#916;<textarea name=\"ak_hp_textarea\" cols=\"45\" rows=\"8\" maxlength=\"100\"><\/textarea><\/label><input type=\"hidden\" id=\"ak_js_1\" name=\"ak_js\" value=\"200\"\/><script>\ndocument.getElementById( \"ak_js_1\" ).setAttribute( \"value\", ( new Date() ).getTime() );\n<\/script>\n<\/p><\/form>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>CONFIDENTIAL INFORMATION &amp; PRIVILEGED ACCESS POLICY The purpose of this Confidential Information &amp; Privileged Access Policy is to establish the proper use and disclosure of Confidential Information and proper use of Privileged Access that an AvaCon, Inc. (&#8220;AvaCon&#8221;) employee,\u00c2\u00a0staff member, independent contractor, or volunteer\u00c2\u00a0may require to perform certain tasks or duties. DEFINITIONS 1. \u00c2\u00a0\u00e2\u20ac\u0153Confidential Information\u00e2\u20ac\u009d [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":9,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-517","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.avacon.org\/blog\/wp-json\/wp\/v2\/pages\/517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.avacon.org\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.avacon.org\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.avacon.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.avacon.org\/blog\/wp-json\/wp\/v2\/comments?post=517"}],"version-history":[{"count":0,"href":"https:\/\/www.avacon.org\/blog\/wp-json\/wp\/v2\/pages\/517\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.avacon.org\/blog\/wp-json\/wp\/v2\/pages\/9"}],"wp:attachment":[{"href":"https:\/\/www.avacon.org\/blog\/wp-json\/wp\/v2\/media?parent=517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}