Effective Date: January 1, 2025
Last Updated: January 1, 2025
1. Purpose
This Acceptable Use Policy (“AUP”) establishes rules governing the proper and secure use of BRCG-owned and client-owned technology systems, networks, and data.
2. Scope
This Policy applies to all employees, contractors, vendors, and any third parties granted access to BRCG systems, devices, resources, or client platforms.
3. Acceptable Use
All users must:
- Access only those systems, data, and applications necessary for the performance of assigned duties.
- Protect passwords, authentication devices, and other credentials against loss, theft, or unauthorized use.
- Follow all client-specific security policies, standards, and procedures.
- Maintain the confidentiality, integrity, and security of client and BRCG systems at all times.
- Promptly report any actual or suspected data loss, security incident, or misuse to the BRCG security team.
- Ensure that physical devices (laptops, phones) are safeguarded against loss or theft.
Limited personal use of BRCG-provided or client-provided systems may be permitted, provided it:
- Does not interfere with job performance,
- Does not introduce security risks, and
- Complies with all applicable policies.
4. Prohibited Use
Users must not:
- Store, download, or process client PII or sensitive information outside of authorized systems or without client consent.
- Share passwords, access credentials, or authentication devices with any unauthorized individuals.
- Install or use unauthorized software, applications, or devices on BRCG or client systems.
- Attempt to disable, bypass, or circumvent security controls or monitoring tools.
- Use systems or data for personal gain, unauthorized marketing, development, or training purposes.
- Engage in any illegal, unethical, or inappropriate activity while using BRCG or client resources.
5. Monitoring and Auditing
- BRCG reserves the right to monitor, audit, and inspect all use of its systems and client platforms to ensure compliance with this policy.
- Users should have no expectation of personal privacy when using BRCG or client systems or devices.
- Monitoring activities will be conducted in a lawful and proportionate manner.
6. Enforcement
- Violations of this Policy may result in disciplinary action up to and including termination of employment or contract.
- Violations may also lead to legal action, civil penalties, and/or notification to affected clients and authorities as required by law or contract.