• Employees may not use AJK information systems in any manner that violates the AJK’s rules of conduct. • Employees may not use AJK information systems in any manner that violates the AJK’s Policy on Confidential and Trade-Secret Information. • Employees may not use or allow another individual to use AJK information systems for any purpose that is competitive with AJK. All such access and use is unauthorized. • Employees must honor and comply with all laws applicable to trademarks, copyrights, patents and licenses to software and other electronically available information. Employees may not send, receive, download, upload, or copy software or other copyrighted or otherwise legally protected information through AJK information systems, email, or the Internet without prior authorization. • Employees may not engage in gambling of any kind, stream movies or videos, watch television programs, or play electronic games utilizing AJK information systems. • Employees may not engage in day trading, or otherwise purchase or sell stocks, bonds or other securities or transmit, retrieve, download, or store messages or images related to the purchase or sale of stocks, bonds, or other securities through AJK information systems. • Use of AJK information systems for illegal or unlawful purposes, including obscenity, libel, slander, fraud, plagiarism, intimidation, forgery, impersonation, soliciting for illegal pyramid schemes, and computer tampering (e.g. spreading of computer viruses) is strictly prohibited. Prohibited Use During Working Time The following conduct is prohibited during an employee’s working time, which excludes time spent on an employee’s meal or rest break, or before or after an employee’s shift: • Employees may not solicit personal business opportunities or conduct personal advertising through AJK information systems. • Employees may not download, transmit, stream, or retrieve messages, data, or information from multi-network gateways, real-time data, and conversation programs including, but not limited to, messaging services, social media, or similar platforms, unless such activity is necessary for business purposes. Access Control – Individual Responsibility Access to all AJK information systems is controlled by the use of User IDs, passwords, and/or tokens. All User IDs and passwords are uniquely assigned to individual employees and consequently, all employees are accountable for all of their actions on the AJK information systems. Employees must not: • Allow anyone else to use their User ID/token and password on any AJK system. • Leave their user accounts logged in at an unattended and unlocked computer. • Use someone else’s User ID and password to access AJK information systems. • Leave their password unprotected (for example, writing it down). Revised January 2024 Page 30 of 55
2024 AJK Employee Handbook Page 34 Page 36