Security Policy
Chillibreeze has a dedicated IT Department committed to help Chillibreeze work faster and smarter. They are responsible to protect Chillibreeze employees, customers and the company from illegal or damaging actions by individuals, either knowingly or unknowingly.
Internet/ Intranet/ Extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, WWW browsing, and FTP, are the property of Chillibreeze Solutions Private Limited. These systems are to be used for business purposes in serving the interests of the company, and of our clients and customers in the course of normal operations.
Below are the policies laid out for employees to guide them on different Chillibreeze owned assets.
The term ‘you’ refers to the user, visitor or viewer of our website.
Acceptable Use Policy
Overview
An Acceptable Use Policy are not to impose restrictions that are contrary to Chillibreeze established culture of openness, trust and integrity. Effective security is a team effort involving the participation and support of every Chillibreeze employee and affiliate who deals with information and/or information systems. It is the responsibility of every computer user to know these guidelines, and to conduct their activities accordingly.
Purpose
The purpose of this policy is to outline the acceptable use of computer equipment at Chillibreeze. These rules are in place to protect the employee and Chillibreeze. Inappropriate use exposes Chillibreeze to risks including virus attacks, compromise of network systems and services, and legal issues.
Scope
This policy applies to the use of information, electronic and computing devices, and network resources to conduct Chillibreeze business or interact with internal networks and business systems, whether owned or leased by Chillibreeze, the employee, or a third party. All employees, at Chillibreeze and its subsidiaries are responsible for exercising good judgment regarding appropriate use of information, electronic devices, and network resources in accordance with Chillibreeze policies and standards, and local laws and regulation.
This policy applies to employees at Chillibreeze, including all personnel affiliated with third parties. This policy applies to all equipment that is owned or leased by Chillibreeze.
Policy
General Use and Ownership:
Security and Proprietary Information:
Unacceptable Use:
The following activities are, in general, prohibited. Employees may be exempted from these restrictions during the course of their legitimate job responsibilities (e.g., systems administration staff may have a need to disable the network access of a host if that host is disrupting production services).
Under no circumstances is an employee of Chillibreeze authorized to engage in any activity that is illegal under local, state, federal or international law while utilizing Chillibreeze-owned resources.
The lists below are by no means exhaustive, but attempt to provide a framework for activities which fall into the category of unacceptable use.
1.System and Network Activities:
The following activities are strictly prohibited, with no exceptions:
2.Email and Communication Activities:
3.Personal blogging and Social Media:
Policy Compliance
1. Compliance Measurement:
The IT team will verify compliance to this policy through various methods, including but not limited to, business tool reports, internal and external audits, and feedback to the policy owner.
2. Exceptions:
Any exception to the policy must be approved by the IT team in advance.
3. Non-Compliance:
An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.
Email Policy
Overview
Electronic email is pervasively used in almost all industry verticals and is often the primary communication and awareness method within an organization. At the same time, misuse of email can post many legal, privacy and security risks, thus it's important for users to understand the appropriate use of electronic communications.
Purpose
The purpose of this email policy is to ensure the proper use of Chillibreeze email system and make users aware of what Chillibreeze deems as acceptable and unacceptable use of its email system. This policy outlines the minimum requirements for use of email within Chillibreeze Network.
Scope
This policy covers appropriate use of any email sent from a Chillibreeze email address and applies to all employees and subsidiaries on behalf of Chillibreeze.
Policy
1. All use of email must be consistent with Chillibreeze policies and procedures of ethical conduct, safety, compliance with applicable laws and proper business practices.
2. Chillibreeze email account should be used primarily for Chillibreeze business-related purposes; personal communication is permitted on a limited basis, but non-Chillibreeze related commercial uses are prohibited.
3. All Chillibreeze data contained within an email message or an attachment must be secured according to the Data Protection Standard.
4. Email should be retained only if it qualifies as a Chillibreeze business record. Email is a Chillibreeze business record if there exists a legitimate and ongoing business reason to preserve the information contained in the email.
5. Email that is identified as a Chillibreeze business record shall be retained according to Chillibreeze Record Retention Schedule.
6. The Chillibreeze email system shall not to be used for the creation or distribution of any disruptive or offensive messages, including offensive comments about race, gender, hair color, disabilities, age, sexual orientation, pornography, religious beliefs and practice, political beliefs, or national origin. Employees who receive any emails with this content from any Chillibreeze employee should report the matter to their supervisor immediately.
7. Users are prohibited from automatically forwarding Chillibreeze email to a third party email system (noted in 4.8 below). Individual messages which are forwarded by the user must not contain Chillibreeze confidential or above information.
8. Users are prohibited from using third-party email systems and storage servers such as Google, Yahoo, and MSN Hotmail etc. to conduct Chillibreeze business, to create or memorialize any binding transactions, or to store or retain email on behalf of Chillibreeze. Such communications and transactions should be conducted through proper channels using Chillibreeze-approved documentation.
9. Using a reasonable amount of Chillibreeze resources for personal emails is acceptable, but non-work related email shall be saved in a separate folder from work related email. Sending chain letters or joke emails from a Chillibreeze email account is prohibited.
10. Chillibreeze employees shall have no expectation of privacy in anything they store, send or receive on the company's email system.
11. Chillibreeze may monitor messages without prior notice. Chillibreeze is not obliged to monitor email messages.
Policy Compliance
1. Compliance Measurement:
The IT team will verify compliance to this policy through various methods, including but not limited to, periodic walk-throughs, video monitoring, business tool reports, internal and external audits, and feedback to the policy owner.
2. Exceptions
Any exception to the policy must be approved by the IT team in advance.
3. Non-Compliance:
An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.
Password Protection Policy
Password Protection Policy
Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of Chillibreeze's resources. All users, including customers with access to Chillibreeze systems, are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords.
Purpose
The purpose of this policy is to establish a standard for creation of strong passwords, the protection of those passwords, and the frequency of change.
Scope
The scope of this policy includes all personnel who have or are responsible for an account (or any form of access that supports or requires a password) on any system that resides at any Chillibreeze facility, has access to the Chillibreeze network, or stores any non-public Chillibreeze information.
Policy
1. Password Creation:
All user-level and system-level passwords must conform to the Password Construction Guidelines.
Users must not use the same password for Chillibreeze accounts as for other non-Chillibreeze access (for example, personal ISP account, option trading, benefits, and so on).
Where possible, users must not use the same password for various Chillibreeze access needs.
User accounts that have system-level privileges granted through group memberships or programs such as sudo must have a unique password from all other accounts held by that user to access system-level privileges.
Where Simple Network Management Protocol (SNMP) is used, the community strings must be defined as something other than the standard defaults of public, private, and system and must be different from the passwords used to log in interactively. SNMP community strings must meet password construction guidelines.
Where Simple Network Management Protocol (SNMP) is used, the community strings must be defined as something other than the standard defaults of public, private, and system and must be different from the passwords used to log in interactively. SNMP community strings must meet password construction guidelines.
2. Password Change:
All system-level passwords (for example, root, enable, NT admin, application administration accounts, and so on) must be changed on at least a quarterly basis.
All user-level passwords (for example, email, web, desktop computer, and so on) must be changed at least every three months. The recommended change interval is for every month.
Password cracking or guessing may be performed on a periodic or random basis by the IT Team or its delegates. If a password is guessed or cracked during one of these scans, the user will be required to change it to be in compliance with the Password Construction Guidelines.
3. Password Protection:
Passwords must not be shared with anyone except with his/her own team and manager. All passwords are to be treated as sensitive, Confidential Chillibreeze information.
Passwords must not be inserted into email messages, Alliance cases or other forms of electronic communication.
Passwords must not be revealed over the phone to anyone.
Do not reveal a password on questionnaires or security forms.
Do not hint at the format of a password (for example, "my family name").
Do not write passwords down and store them anywhere in your office. Do not store passwords in a file on a computer system or mobile devices (phone, tablet) without encryption.
Do not use the "Remember Password" feature of applications (for example, web browsers).
Any user suspecting that his/her password may have been compromised must report the incident and change all passwords.
4. Use of Passwords and Passphrases:
Passphrases are generally used for public/private key authentication. A public/private key system defines a mathematical relationship between the public key that is known by all, and the private key, that is known only to the user. Without the passphrase to "unlock" the private key, the user cannot gain access.
Passphrases are not the same as passwords. A passphrase is a longer version of a password and is, therefore, more secure. A passphrase is typically composed of multiple words. Because of this, a passphrase is more secure against "dictionary attacks".
A good passphrase is relatively long and contains a combination of upper and lowercase letters and numeric and punctuation characters. An example of a good passphrase:
"The*?#>*@TrafficOnThe101Was*&#!#ThisMorning"
All of the rules above that apply to passwords apply to passphrases.
Policy Compliance
1. Compliance Measurement:
The IT team will verify compliance to this policy through various methods, including but not limited to, periodic walk-thrus, video monitoring, business tool reports, internal and external audits, and feedback to the policy owner.
2.Exceptions
Any exception to the policy must be approved by the IT team in advance.
3.Non-Compliance:
An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.