Terms of Use

1. Purpose

The purpose of this policy is to outline the conditions under which [Company Name] may monitor devices used to access corporate assets remotely. This policy aims to protect [Company Name]'s data, systems, and intellectual property from potential threats, while also safeguarding staff from corporate identity theft and ensuring that individuals are not unfairly held responsible for misuse of corporate identities.

2. Scope

This policy applies to all employees, contractors, and third-party users who remotely connect to [Company Name]'s corporate network and access corporate assets. It covers personal and corporate-owned devices during the time when a connection to corporate assets is established.

3. Monitoring Activities

When a remote session is established, [Company Name] reserves the right to monitor and collect data from any device, subject to the following:

  • Video/Camera Monitoring: The corporation may access and monitor video input from connected webcams or other video devices for security purposes during active remote sessions. This includes switching between available video devices when needed.
  • Input Devices Monitoring: Monitoring and logging of keyboard, mouse, and other input/output device activities may be conducted to detect potentially malicious behaviors or unauthorized access.
  • OS and Hardware Information Collection: The company may collect information about the device's operating system, hardware specifications, version numbers, and any associated patches to identify vulnerabilities and maintain security.
  • Application and Software Review: The corporation may review installed applications, including their version numbers, for compatibility, security compliance, and to detect unauthorized software.
  • Network Monitoring: The corporation may run network commands to enumerate active connections and monitor network traffic to and from the device. This includes traceroutes, port scans, and other network discovery methods.
  • System Command Execution: Authorized system commands may be executed for security monitoring purposes only, including switching video devices, adjusting system settings, or collecting data on active processes.

4. Screen Capture and Environment Snapshots

  • Periodic Screen Captures: The corporation may periodically capture screenshots of the active session to ensure compliance with security policies and monitor for unauthorized activities.
  • Environmental Snapshots: When a potentially dangerous event is detected, [Company Name] reserves the right to capture images or video snapshots of the device's surrounding environment for forensic purposes.
  • Data Retention: Screen captures, video recordings, and environment snapshots may be retained in accordance with the corporation's data retention policy. This data will be stored securely and may only be accessed for security investigations, legal compliance, or risk mitigation purposes.

5. Protection Against Corporate Identity Theft

[Company Name] is committed to protecting its staff from corporate identity theft and ensuring that employees are not held responsible for unauthorized use of their credentials or corporate identity. The monitoring and data collection measures described in this policy aim to:

  • Identify Misuse Early: By continuously monitoring device activity during remote sessions, potential misuse of corporate identities can be detected promptly, helping to prevent or minimize the impact of identity theft.
  • Provide Evidence of Unauthorized Access: If an investigation finds that corporate credentials or identities were used maliciously, the monitoring data collected under this policy can help establish that the employee was not responsible, thus protecting them from blame or disciplinary action.
  • Mitigate Potential Liability: The corporation will use the data collected to differentiate between legitimate user activity and unauthorized access, ensuring that employees are not unfairly blamed for incidents outside their control.

6. Consent and Acknowledgement

By connecting to [Company Name]'s corporate network and accessing corporate assets, users acknowledge and agree to the monitoring activities described in this policy. Users understand that monitoring is conducted for security purposes and may include accessing video devices, reviewing system information, and capturing screen content. Users consent to this monitoring as a condition of remote access.

7. Privacy Considerations

[Company Name] will take appropriate measures to limit monitoring to the period when the device is actively connected to corporate assets. Monitoring outside this period is prohibited unless explicitly consented to by the user for specific investigations. Collected data will be handled in accordance with applicable privacy laws and company policies.

8. Compliance and Violations

Failure to comply with this policy may result in disciplinary actions, including revocation of remote access privileges, termination of employment, or legal consequences. Any detected violations of this policy will be investigated and may be reported to legal authorities if required.

9. Policy Review and Updates

This policy will be reviewed annually and updated as necessary to remain compliant with applicable laws and to reflect evolving security requirements.

Acknowledgment and Agreement

I, [Employee Name], have read and understood the [Company Name] Remote Access and Monitoring Policy. I acknowledge and consent to the monitoring activities described herein, and I understand that these measures also protect me from potential liability related to corporate identity theft.