Network Security and Acceptable Use Policy

Effective Date: 01 Sep 2025

Overview

This policy is to protect Manodayam’s electronic information from being inadvertently compromised by authorized personnel connecting to the Manodayam network locally and remotely.

Purpose:

The purpose of this policy is to define standards for connecting to Manodayam network from any host. These standards are designed to minimize the potential exposure to Manodayam from damages, which may result from unauthorized use of Manodayam resources.
Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Manodayam internal systems, etc.

Audience:

This policy applies to all Manodayam employees, volunteers/directors, contractors, vendors, and agents with a computer or workstation used to connect to the Manodayam network. This policy applies to remote access connections used to do work on behalf of Manodayam, including reading or sending email and viewing intranet resources.

Policy Sections:

Network Security
Remote Access
Wireless Communication
Security concerns and acceptable use

Policy:

Network Security

  • Users are permitted to use only those network addresses assigned to them by Manodayam IT Department.
  • All remote access to Manodayam will either be through a secure connection on a Manodayam owned device that has up-to-date anti-virus software. Remote users may connect to Manodayam Information Systems using only protocols approved by IT. Users inside the Manodayam firewall may not be connected to the Manodayam network at the same time a remote connection is used to an external network.
  • Users must not extend or re-transmit network services in any way. This means a user must not install a router, switch, hub, or wireless access point to the Manodayam network without Manodayam IT approval.
  • Users must not install network hardware or software that provides network services without Manodayam IT approval. Non-Manodayam computer systems that require network connectivity must be approved by Manodayam IT.
  • Users must not download, install, or run security programs or utilities that reveal weaknesses in the security of a system. For example, Manodayam users must not run password-cracking programs, packet sniffers, network mapping tools, or port scanners while connected in any manner to the Manodayam network infrastructure. Only the IT Department is permitted to perform these actions.
  • Users are not permitted to alter network hardware in any way.

Remote Access :

It is the responsibility of Manodayam employees, volunteers/directors, contractors, vendors, and agents, with remote access privileges to Manodayam corporate network, to ensure that their remote access connection is given the same consideration as the user’s on-site connection to Manodayam.
General access to the Internet, through the Manodayam network is permitted for employees who have flat-rate services and only for business purposes. Manodayam employees are responsible to ensure that they:

• Do not violate any Manodayam policies
• Do not perform illegal activities
• Do not use the access for outside business interests
• Manodayam employees bear responsibility for the consequences should access be misused.
• Employees are responsible for reviewing the following topics (listed elsewhere in this policy) for details of protecting information when accessing the corporate network via remote access methods and acceptable use of Manodayam network:

Requirements:

• Manodayam employees, volunteers/directors, and contractors should never provide their login or email password to anyone, including family members.
• Manodayam employees, volunteers/directors, and contractors with remote access privileges:
• Must ensure that their computer, which is remotely connected to Manodayam corporate network, is not connected to any other network at the same time, with the exception of personal networks that are under the complete control of the user.
• Must not use non-Manodayam email accounts (not limited to Gmail, Outlook, Hotmail, Yahoo, AOL), or other external resources to conduct Manodayam business, thereby ensuring that official business is never confused with personal business.
• For remote access to Manodayam hardware, all hardware configurations must be approved by IT.
• All hosts that are connected to Manodayam internal networks, via remote access technologies, must use up-to-date, anti-virus software applicable to that device or platform.
• Organizations or individuals who wish to implement non-standard Remote Access solutions to the Manodayam production network must obtain prior approval from IT.

Wireless Communications:

Access to Manodayam networks is permitted on wireless systems that have been granted an exclusive waiver by IT for connectivity to Manodayam networks.

This section covers any form of wireless communication device capable of transmitting packet data. Wireless devices and/or networks without any connectivity to Manodayam networks do not fall under the review of this policy.

Register Access Points and Cards

All wireless Access Points/Bas e Stations connected to the corporate network must be registered and approved by IT. If they are installed in corporate PCs, all wireless Network Interface Cards (i.e. PC cards) used in corporate laptop or desktop computers must be registered with IT.

Approved Technology

All wireless LAN access must use Manodayam approved vendor products and security configurations.

Setting the Service Set Identifier (SSID)

The SSID shall be configured so that it does not contain any identifying information about the organization, such as the company name, division title, employee name, or product identifier.

The use of a mobile device connecting to the Manodayam network is a privilege granted to the User by management approval per the Network Security and Acceptable Use Policy . If the User does not abide by the terms, IT Management reserves the right to revoke the privilege granted herein. The policies referenced herein are aimed to protect the integrity of data belonging to Manodayam and to ensure the data remains secure.

In the event of a security breach or threat, Manodayam reserves the right, without prior notice to the User, to disable or disconnect the connection of the mobile device. 

Security Concerns and Acceptable use:

Compliance by the User with the following Manodayam policies, published elsewhere and made available, is mandatory: Acceptable Use of Information Systems, Anti-Virus, E-Mail, Password, Safeguarding Member Information, and Telecommuting.

User of the mobile device shall not remove sensitive information from the Manodayam network, attack Manodayam assets, or violate any of the security polices related to the subject matter of this agreement.

The User understands and agrees that his/her use of the software is required as part of his/her employment at Manodayam and is permitted to connect to internal information services in support of Manodayam activities only.

The User will safeguard the access as well as its components (software/password) from any unauthorized us.

The will be used on a company approved mobile device that is protected by a personal firewall. The company-approved mobile device may be subject to scanning from the IT Department to check compliance with the contents of this Agreement.

Support:

Manodayam will offer support for connectivity to the Manodayam network. Manodayam is not responsible for ISP outages that result in a failure of connectivity to the Manodayam network.

The User assumes full liability including, but not limited to, an outage or crash of any or all of the Manodayam network.

The User certifies that this Agreement has been read and has an understanding of the above conditions under which the User may be provided access to Manodayam computer/information.

Systems and further that the User understands and agrees to abide by them. The User also understands that limitations on disclosure of any information covered under this Agreement shall survive the modification or elimination of the User access to Manodayam computer/information systems.