SkillStack Safe Internet Use Policy
1. Purpose / Objective
This policy outlines SkillStack Consulting’s expectations for the responsible, secure, and appropriate use of the internet and digital resources in the workplace. Its purpose is to protect company systems, sensitive client data (including tournament and sponsor information), and SkillStack’s reputation, while ensuring a safe and productive working environment.
2. Scope
This policy applies to all SkillStack employees, contractors, interns, volunteers, and event partners using SkillStack’s digital resources.
The use of personal computers, personal email accounts, or private storage devices (e.g., USB drives, external hard drives, personal cloud accounts) for any work-related activities is strictly prohibited.
All work files, emails, and communications must be created, stored, and shared through company-approved systems and devices.
3. Policy Statement
The internet is provided primarily for business purposes to support SkillStack’s operations, event delivery, research, communication, and productivity.
Employees must use company-issued devices and authorised platforms for all work-related tasks.
Personal use of the internet must be minimal, appropriate, and must not interfere with work responsibilities.
Accessing, downloading, or distributing offensive, illegal, or inappropriate content is strictly prohibited.
Users must not attempt to bypass security systems, install unauthorised software, or access restricted websites.
The use of personal devices or storage systems to store, send, or access SkillStack information is not permitted under any circumstances.
4. Procedures
All employees and contractors will be provided with secure, company-managed devices and access to authorised platforms.
The IT team will maintain internet filters, monitoring tools, and cybersecurity systems to ensure compliance.
Any work-related files must be stored only on approved cloud systems or SkillStack’s internal networks.
Employees must report suspected security breaches, phishing attempts, or misuse of internet resources immediately.
5. Responsibilities
Employees: Use the internet responsibly and report any concerns or breaches.
Managers: Ensure their teams understand and comply with this policy.
IT Department: Manage access controls, cybersecurity measures, and provide technical support.
6. Review Date
This policy will be reviewed annually, or earlier if required due to changes in technology, regulatory standards, or security protocols.
