Privacy Policy
| 1. Introduction |
Computer information systems and networks are an integral part of business within Kwikspace. The company has made a substantial investment in human capital and financial resources to create and maintain these systems and networks and the integrity and operation thereof should always be protected.
The enclosed policy has been established in order to:
- Protect this investment
- Safeguard the information contained within these systems
- Reduce business and legal risk
- Protect the reputation of the company
The topics covered in this document include:
- Statement of responsibility
- The Internet, E-mail, and Telephone use
- Computer Viruses
- User accounts and passwords
- Physical Security
- Software copyright and license agreements
- Home and mobile use
| 2. Condition of Employment |
Adherence to this Information Technology, Internet and Security End-user policy is a condition of employment. Contraventions of this policy may result in disciplinary action in accordance with company policy and the company’s disciplinary code and procedures.
| 3. Administration |
All departmental managers with the help of the IT department are responsible for the administration of this policy.
| 4. Statement of Responsibility |
General responsibilities pertaining to this policy are set forth in this section. The following sections list the additional specific responsibilities.
- Manager Responsibilities:
Ensure that all appropriate employees are aware of and comply with this policy.
- IT Department Responsibilities:
- Develop and maintain written standards and procedures necessary to ensure implementation of and compliance with these policy
- Provide appropriate support and guidance to assist employees to fulfil their responsibilities under this directive.
| 5. Internet, e-mail, telephone and printer usage policy |
LANDLINES
- The company reserves the right to perform spot-checks on an ad-hoc basis and at the discretion of management.
- The company will continue to monitor telephone use via the telephone management system. Summaries are supplied to the managers on a weekly basis and details can be requested from managers should it be required.
- The R 50.00 personal call limit is not accumulative and amounts not utilized in one month cannot be carried over to another
- In the event of identification of excessive personal calls, the full amount less the R 50.00 will be deducted from the employee’s salary in the same month in which the calls were made, and no repayment terms will be
- The disciplinary steps should excessive personal calls be made shall be as follows:
- Personal use of between R50 and R100 per month – Counseling (in writing)
- Personal use of between R100 and R400 – Verbal warning
- Personal use of between R400 and R800 per month – Written warning
- Personal use exceeding R800 – Final written warning
- If an employee commits a second offence while the first warning is still valid, progressive warning will be issued, regardless of the amount of the personal telephone calls during the applicable
- Another warning, based on above disciplinary measures, could also be issued (at the same time), for excessive time spent on personal matters during working
CELL PHONES
- In the event of an employee’s personal cell phone being used for business purposes, the employee must use the cell phone mainly for business purposes and maintain account within agreed upon limits, amounts exceeding cannot be claimed back unless motivated to be work
- The cell phone call limit is not accumulative and amounts not utilized in one month cannot be carried over to another month. In the event of calls made being less than the limit the shortfall cannot be claimed from the company in
EMAIL, INTERNET AND PRINTER USAGE
- The Internet is a large, publicly accessible network of networks that has millions of connected users and organisations world-wide. The World-Wide Web (WWW) is a subset of the Internet and is a collection of interlinked documents and multi-media files.
- Access to the Internet is provided to employees for the benefit of the company and its business. Employees can connect to a variety of business information resources around the world, through the WWW, Internet access through the network is limited to company employees and others that the company may authorised from time to time.
- Conversely, the Internet and WWW is also replete with risks and inappropriate material. To ensure that all employees are responsible and productive Internet users and to protect the company’s interests the following policy has been established for using the Internet and e-mail.
- Each employee indemnifies the company against the loss, liability, damage or expense which the company may suffer as a result of which may be attributable to any claims or liabilities (including claims or liabilities for consequential loss) of the company or any third party which may arise out of a breach by such employee of this computer usage policy.
- The company printer must only be used for the printing of business-related documents. Printing of colour documents must be limited to reduce printing costs.
ACCEPTABLE USE
Employees using the Internet including e-mail are representing the company. Employees are responsible for ensuring that the Internet is used in an effective, ethical and lawful manner.
Examples of acceptable use are:
- Using web browsers to obtain business information for company use from commercial or academic web sites.
- Accessing databases for information as needed for company business
- Using E-mail for business
- Utilizing the Internet, including e-mail, as a toll to advance the business objectives of the
UNACCEPTABLE USE
Employees must not use the Internet or e-mail for purposes that are illegal, unethical, harmful to the company (including statements, actions or omissions that do, or could, lead to civil and/or criminal liability to the company or damage or loss to the company or its reputation) or fellow employees.
Examples of unacceptable use are:
- Viewing, accessing, copying, processing or transmitting of any content or material that is offensive, harassing, fraudulent, illegal or obscene including any form of pornography, hate mail, racist remarks or hoaxes to any company employee, trading partner, customer or anybody
- Sending or forwarding chain e-mail, for example, e-mail messages containing instructions to forward the message to others where not for official or company business purpose (chain letters). This includes the broadcasting of e-mail, i.e. sending the same message to more than 5 recipients or more than one distribution list if not specifically work
- Sending or forwarding joke e-mails, electronic greeting cards, Christmas cards, music files (e.g. MP3), video clips (not related to official business) and
- Accessing and viewing of social sites i.e. Facebook and Twitter during business hours seeing as this interferes with job responsibility and exposes the company network to additional risk of viruses and unauthorised
- Sending or receiving unusually large e-mails should be avoided – acceptable size is 2MB or
- Representing personal opinions as that of the company via e-mail or publication of unauthorised statements onto web sites, bulletin boards, discussion areas or
- Conducting a personal business using company
- Conducting any form of a campaign against fellow employee or any third party by e-mail.
- Using third party e-mail providers, i.e. “Hotmail”, “Yahoo mail”, “Free mail” or any other e-mail service provided by an outside Internet Service Provider or party, to send company information or any files emanating from within the company to external
- No employee shall share an electronic mail password, provide electronic mail access to an unauthorized user or access another user’s electronic mailbox, without authorization. In addition, the employee shall not post, display or make easily available any computer system access information including, but not limited to, passwords.
- Attempting to access, disable or compromise the security of any information contained in the computer system.
- Using the computer system for commercial or personal advertisements, solicitations and
- Using a modem whilst connected to the company’s internal network – under no circumstances is any modem allowed to be used when a workstation or laptop is connected directly to the company’s
- Subscribing to news companies and mailing lists is prohibited, other than where such subscription is necessary for a work-related purpose, in which case prior approval must be sought from
- Printing of personal
EMPLOYEE RESPONSIBILITIES
- Company employees may access the Internet through the company’s network for the purpose of conducting the company’s business. Viewing, copying, storing or sending Internet content outside of the scope of the company’s employment is prohibited. The company provides Internet access through the company’s network to company employees as a privilege that is based on adherence to the company’s policies and rules regarding Internet access.
- In addition to being responsible to abide by the conditions as set out in this end-user policy, including but not limited to this paragraph an employee who uses the Internet or Internet e-mail shall:
- Ensure that no communications not interfere with his/her or any other employee’s
- Be responsible for the content of all text, audio, or images that he/she places on or sends over the
- Not transmit copyrighted materials without permission of the author thereof or without defining and acknowledging the owner
- Know and abide by all applicable Kwikspace policies dealing with security and confidentiality of company records.
- Avoid, where possible, transmission of information confidential to the company or its stakeholders. If it is necessary to transmit confidential information, employees are required to take steps to ensure that information is delivered to the proper person who is authorised to receive such information for a legitimate purpose.
- Report any form of irregularity or transgression of this end-user policy (e.g. receipt of objectionable email) to the Departmental Manager or IT
COPYRIGHTS AND DOWNLOADS
- Employees using the Internet are not permitted to illegally and/or wrongfully copy, transfer, rename, add, modify or delete protected works, information or programmes. Employees are responsible for observing copyright and licensing agreements that may apply when downloading or distributing files, documents and software. Any copyrighted material attached to a message should identify the author and acknowledge his/her copyright.
- Employees must obtain approval from the IT Department and if necessary, the company’s authorised personnel before downloading material for which a fee is requested. Failure to observe copyright or license agreements may result in disciplinary action by the company and / or legal action by the copyright owner.
MIMECAST
- Email is essential to our everyday jobs. We want to ensure that our employees understand the limitations of using their corporate email accounts. Our goal is to protect our confidential data from breaches and safeguard our reputation and intellectual property.
- This applies to all employees and vendors who are assigned (or given access to) a corporate email. This email may be assigned to an individual (e.g. somebody@kwikspace.co.za) or department (e.g. HR@kwikspace.co.za)
- Corporate emails are tools that aid employees in carrying out their job functions. Employees should use their company email for work-related purposes.
INAPPROPRIATE USE OF COMPANY EMAIL
Our employees represent Kwikspace Modular Buildings (Pty) Ltd whenever they use their corporate email address. Employees must not:
- Sign up for illegal, unreliable, disreputable or suspect websites and services.
- Send unauthorized marketing content or solicitation emails.
- Send insulting or discriminatory messages and content.
- Intentionally spam other people’s emails, including their co-workers.
Kwikspace Modular Buildings (Pty) Ltd has the right to monitor and archive all corporate emails.
APPROPRIATE USE OF CORPORATE EMAIL
Employees can use their corporate email for work-related purposes without limitations.
For example, employees can use their email to:
- Communicate with current or prospective customers and suppliers.
- Log in to purchased software they have legitimate access to, e.g. Accpac, Visio.
- Sign up for newsletters, platforms and other online services that will help them
with their jobs or professional growth.
PERSONAL USE
Employees can use their corporate email for personal reasons, with the explicit understanding that the company has the right to access all emails sent and or received
on the company email address.
- People’s personal info will Not be backed up and can be deleted by the company if needs be, at any time
- It is the responsibility of the employee to take their own personal info off laptops if they chose to
- Anything personal stored on company property (laptops), is the property of the company
Employees must always adhere to this policy, in addition to our confidentiality and data protection guidelines.
EMAIL SECURITY
Email is often the medium of hacker attacks, confidentiality breaches, viruses and other
malware. These issues can compromise our reputation, legality and security of our equipment. Employees must:
- Select strong passwords with at least eight characters (capital and lower-case letters, symbols and numbers) without using personal information (e.g. birthdays.)
- Remember passwords instead of writing them down and keep them secret.
- Change their email password frequently.
- Also, employees should always be vigilant to catch emails that carry malware or phishing attempts.
We instruct our employees to:
- Avoid opening attachments and clicking on links when content is not adequately explained (e.g. “Watch this video, it’s amazing.”)
- Be suspicious of clickbait titles.
- Check email and names of unknown senders to ensure they are legitimate:
- Look for inconsistencies or style red flags (e.g. grammar mistakes, capital letters, excessive number of exclamation marks.)
If you are not sure that an email you received is safe, you can send it to our IT Department itsupport@marstech.co.za, for security verification.
We remind all employees to keep their anti-malware programs updated.
E-MAIL IDENTIFICATION AND DISCLAIMER
To ensure that an e-mail message is properly identified apart from the sender’s e-mail address it is compulsory that the sender places the company’s e-mail signature and disclaimer at the foot of each individual e-mail message. This signature will be put in place by the IT department and cannot be removed or replaced.
Email signature to be circulated for implementation:

MONITORING AND PRIVACY
Any electronic communication by or with an employee is not considered private, despite any such designation either by the sender or the recipient thereof. The company reserves the right to read, access and/or monitor all electronic communication and the computer system, including an employee’s electronic mailbox (incoming and outgoing mail) at its discretion and in the ordinary course of business.
In certain circumstances the company may be compelled to access and disclose communications sent over its electronic mail system. Should any private information of the employee be contained in such messages the company agrees to honour such privacy, it being recorded that any messages which may be personal by nature may be accessed and used by the company where such messages cause harm to the company or has the potential of causing harm, and where the nature or content of the message is or is suspected to be contrary to this policy or is otherwise unlawful.
In addition, the company shall be entitled to intercept and/or block any electronic mail messages which an employee sends or receives or attempts to send or receive, provided such action by the company shall be for lawful business purposes and to ensure that an employee is not exposing the company to any liability or prejudicing any the company’s rights or its reputation. The existence of passwords and the ability to delete electronic mail messages does not restrict or eliminate the company’s ability or right to access electronic communications.
All Internet communication must be treated as non-confidential as anything sent through the Internet passes through several different computer systems, all with different levels of security.
The confidentiality of communications may be compromised at any point in their transmission unless the communications are suitably encrypted. Accordingly, no confidential information may be transmitted electronically outside of the company’s networks without the appropriate security precautions being taken.
All communications, including text, video or audio clips and images, can be disclosed to law enforcement or other third parties without prior consent of the sender or the receiver.
| 6. Computer Viruses |
Computer viruses are programmes designed to make unauthorised changes to programmes and data. Therefore, viruses can cause destruction of corporate resources. It is important to know that computer viruses are much easier to prevent than to cure. Defenses against computer viruses include protection against unauthorised access to computer systems, using only trusted sources for data and programmes, and maintaining virus-scanning software.
- DEPARTMENT RESPONSIBILITIES:
The IT Technician shall:
- Install and maintain appropriate anti-virus software on all computers. Virus updates are sent to employees via the Network. Employees should be responsible for running the update as soon as possible after receiving the update if this does not happen
- Respond to all virus attacks, destroy any virus detected and document each
- EMPLOYEE RESPONSIBILITIES:
- Employees shall not knowingly introduce a computer virus into company
- Where anti-virus updates are not automatic it is the employee’s responsibility to ensure that the updates are run as soon as possible after receiving such
- Run a virus scan on any executable file(s) received through e-mail.
- Employees shall not load diskettes, CD-ROMS, DVD’s or any other media type of unknown origin. All incoming media shall be scanned for viruses before they are read or
- Any employee who suspects that his/her workstation has been infected by a virus shall IMMEDIATELY POWER OFF the workstation and notify the IT Department to take corrective
| 7. User Accounts & Passwords |
The confidentiality and integrity of data stored on company computer systems must be protected by access controls to ensure that only authorised employees have access. This access shall be restricted to only those capabilities that are appropriate to each employee’s job duties.
In addition, employees shall access the Internet in a manner that does not compromise the company’s network security. This includes the employee keeping his/her username and password secure, prohibiting access to intruders or viruses, and reporting any suspicious activity to the company’s IT Department.
- IT DEPARTMENT RESPONSIBILITIES:
The IT Department will be responsible for the administration of access controls to all company computer systems. The IT Technician will process additions, deletions and changes upon receipt of a written request from the Departmental Manger.
Deletions may be processed by an oral request prior to reception of the written request. The IT Department will maintain a list of administrative access codes and passwords and keep this list in a secure area.
- EMPLOYEE RESPONSIBILITIES
Each employee:
- Shall be responsible for all computer transactions that are made with his/her User ID (username) and password.
- Shall not disclose passwords to others. Passwords must be changed immediately if it is suspected that they may have become known to others. Passwords should not be recorded or kept where they might be easily
- Will change passwords at least every 30 (thirty) to 60 (sixty) days or as automatically prompted by the system. The following criteria should be taken into account;
- Password length: > = 8 characters;
- Password complexity: enabled (Alpha Numeric – upper and lower case, forced special characters);
- Password history: > = 10 passwords;
- Maximum invalid login attempts: 3; and
- Account lockout duration: 0 or 24hrs
- Shall use passwords that will not be easily guessed by others.
- Shall log out (or shutdown) when leaving a workstation for an extended period and ensure that a screensaver is used that is protected by a password that automatically activates after a maximum of 5 (five) minutes of inactivity on the computer
- MANAGERS RESPONSIBILITY
- The Human Resources Department should notify the IT Department promptly whenever an employee leaves the company or transfers to another department.
- The Department Managers should complete and submit to the IT Department, the Removal of Network/IT Systems Access Form so that his/her access can be revoked.
- The Human Resources Department should report Involuntary terminations concurrent with the termination.
- Management shall ensure that the Password policy is updated in line with leading practice.
| 8. Physical Security |
- It is company policy to protect computer hardware, software, data and documentation from misuse, theft, fraud, unauthorised access and environmental hazards.
- All laptops must be locked with a security cable when in use in the office or elsewhere to limit the chances of theft.
- Should an employee be responsible either by negligence or with intent for damage or theft of company IT equipment, the employee would be held responsible for reparations cost, replacement cost or for the Insurance excess amounting to R2,500 in the event of material insurance claims.
- Employees are obliged to comply with the security policies and procedures implemented from time to time by the company in order to prevent any damage or unauthorized access to the computer system.
- All material downloaded to the computer system, whether from the Internet, electronic mail or hard copy discs provided by clients of the company, employees and/or third parties, must first be scanned for viruses or any other destructive programs, before being downloaded onto the computer system.
- Employees may only access the Internet or any other computer network outside of the computer system through an approved Internet “firewall” Accessing the Internet or any external computer network directly, by modem, is strictly prohibited without prior written authorization. No employee may establish Internet or other external network connections that would allow unauthorized persons to gain access to the company’s computer systems and
- Employees are expected to exit the computer system at the end of each working day and to “log off” from the relevant network to prevent the possibility of any unauthorized access to the computer system (i.e., Accpac) if there’s no input on Accpac for 30minutes, the system will automatically log you off.
- EMPLOYEE RESPONSIBILITIES
The policy below applies to all employees:
- Storage devices should be stored out of sight when not in use. If they contain highly sensitive or confidential data, they must be locked
- Storage devices should be kept away from environmental hazards such as heat, direct, sunlight and magnetic
- Environmental hazards to hardware such as food, smoke, liquids, high or low humidity and extreme heat or cold should be avoided.
- Since the IT Department is responsible for all equipment installations, disconnection, modifications and relocations, employees are not to perform these activities. This does not apply to temporary moves of portable computers for which an initial connection has been set up by the IT
- Employees should exercise care to safeguard the valuable electronic equipment assigned to them. Employees who neglect this duty will be accountable for any loss or damage that may
- Under no circumstance may any other equipment be connected to the company’s network without prior, written approval by the IT
| 9. Hardware, Software Copyright and License Agreements |
- All software acquired for or on behalf of the company or developed by company employees or contract personnel on behalf of the company is and shall be deemed company property. All such software must be used in compliance with applicable licenses, notices, contracts and
- All hardware acquired by the company must be used for intended business purposes, which relates to relevant jobs description and requirements in order to execute duties.
- All common drives on the company network are intended for business purposes and only information relating to the business must be stored on these drives. No personal information/documentation i.e., DVD’s, MP3 files or photos can be stored on these drives seeing as space is limited and backed up daily, excessive storage on these drives would possibly compromise back up ability and the network performance.
- All business-related information must be stored and backed up on the network on a regular basis where possible to reduce the risk of data and information being lost due to damage or possible theft to IT equipment. The common Network drives would be backed up daily and stored. Should an employee fail to replicate data from their PC on the network and data is lost for whatever reason, the employee would be responsible to recreate date at own time and expense.
- Non-compliance with legislation dealing with intellectual property, including copyright, such as the Copyright Act and with license agreements can expose the company and the responsible employee(s) to civil and/or criminal liability. Unless otherwise provided in the applicable license, notice, contract, or agreement, any duplication of copyrighted software, except for backup and archival purposes, may be a violation of
- This policy applies to all software that is owned by the company, licensed to the company, or developed using company resources by employees or vendors.
- All computers made available to employees are provided with all necessary hardware and software to meet employee requirements. To the extent that any employee requires any further hardware and/or software, such employee shall requisition same in accordance with the then standard policies and procedures of the company.
- No employee shall, at any time, add any hardware and/or software to any computer and/or the computer system, without express prior authorization.
- It is recorded that the company has committed itself to the exclusive use of licensed software. No employee shall be entitled to install any unlicensed and/or unauthorized software on any computer and/or the computer system. In the event of an employee installing any unlicensed and/or unauthorized hardware and/or software on any computer and/or the computer system, such employee shall be liable for any costs and losses incurred or damages suffered by the company as a consequence of such unlicensed and/or unauthorized
- In addition such employee hereby indemnifies the company in respect of any costs and losses incurred or damages suffered by the company (including consequential damages); which costs, losses and damages may include, without limiting the generality of the a foregoing, any outstanding license fees, fines, penalties or charges incurred by or impose upon the company as well as any loss of profits and productive working time occasioned as a result of such unlicensed and/or unauthorized
- Software installed on company PC’s must be work related and used in order to fulfill job requirements and not of a personal nature.
- IT DEPARTMENT RESPONSIBILITIES
The IT Department shall:
- Maintain records of Hardware and software licenses owned by the company
- Periodically (at least annually) scan company computers to verify that only authorised software is
- Monitor company hardware on an continues basis to ensure the initial installed hardware is used for intended
- Ensure that network drives are backed up daily.
- EMPLOYEE RESPONSIBILITIES
Employees shall not:
- Install software unless authorised by the IT Department. Only software that is licensed to or owned by Kwikspace is to be installed on Kwikspace computers. Under no circumstances will any assistance/support be given on unauthorised or illegal
- Change or replace company hardware under any
- Copy
- Download and install software unless authorised by the IT
- Store information of a personal nature on network drives.
| 10. Home and Mobile Use |
- Employees accessing the company’s network from home or during a business trip must ensure that he/she uses the necessary security software that will establish secure communication to the company’s security systems when retrieving e-mail or accessing the company’s system. Under no circumstances is any other unauthorised user allowed to use this facility. Time spent online interacting with company systems should be limited to the minimum in order to limit connection fees.
- When travelling the laptop must be stored out of sight in the vehicle, were possible in the luggage compartment to reduce the risk of possible break inns and theft.
- In the event of a workstation or laptop being stolen, this must immediately be reported to the company IT Department, to arrange for all security access to be suspended.
- If there are any aspects regarding this policy that are unclear, please consult with your Departmental Manager.
| 11 . Locations To Use When Saving Documentation on Your Computer / Laptop |
- The C:/ drive on the company computers is NOT backed-up. This means that if your
computer crashes or gets stolen; we will not be able to recover these documents for
you and creates a huge risk in the sense of losing critical documentation /IP and the hours spent on creating it.
- Employees are to ensure that they save their documents on the Home (H:/ drive). Your computer should be set up in such a way that you can access your documents on the H:/ drive when off-line or from home for instance. What happens is that you can see, access and work on your documents on the H:/ drive from home and then as soon as you’re back at the office and on-line again, your computer will automatically syncs with the network and all documents gets backed up accordingly. Should you not be able to access your H:/ drive and/or other network drives through the Kwikspace VPN – please log a call for an IT representative to change your computer set-up accordingly on itsupport@marstech.co.za.
- You can also save your documents on the Shared or Common drives. Some
departments/divisions even have their own dedicated network drives, for instance “Exco” in the sample below. These drives can either be open/shared or restricted in order for only certain people being able to access a specific folder.
- To make it easier to remember, please refer to the image below, indicating which drives are backed-up and which ones are not – please ensure to store your documents on the correct drives. Help us to save all the documents on your desktop or C:/ drive by moving it to the H:/ or shared drives accordingly.
- SERVER SPACE: Note that the H:/ and Shared or Common network drives are for work related documentation only. To ensure we don’t run out of space, please look at what you have saved on your home (H:/) drive at the moment. Personal photos, music and/or movies have to be deleted or backed-up to your own external HDD / Memory sticks. Any such documentation can and will be deleted off of the server on a regular basis to ensure we have enough space available.

- Failure to do so, causing loss of critical work-related documentation, may lead to disciplinary action.
and recordkeeping
| 12 . Policy Responsibilities |
The policy and procedure owner is the Kwikspace CEO or delegated authority who is responsible for maintaining this policy and procedure. All managers are responsible for implementation.
| 13 . Breach of Policy |
Any breach of this policy and procedure will be dealt with in terms of the Disciplinary Policy including the Code of Conduct.
| 14 . Authorisations |
Approved by Kwikspace EXCO.
| 15 . Acknowledgement of Policy |
Each employee assigned a desktop or laptop computer, workstation or network account needs to sign the following acknowledgement form and return it to the Departmental Manager who will then ensure that it is included in the relevant employee’s personnel file.
This form is used to acknowledge receipt of, and agreement with, the Kwikspace Information Technology, Internet and Security End-user Policy.
- PROCEDURE
- Read the “Kwikspace Information Technology, Internet and Security End-user Policy”.
- Sign in full and complete the details in the spaces provided
- Return this acknowledgement form to your Departmental
- SIGNATURE
By signing below, I agree to the following terms:
- I have received and read a copy of the “Kwikspace Information Technology, Internet and Security End-user Policy” and understand the
- I understand and agree that any computers, software and storage media provided to me by Kwikspace contains proprietary and confidential information about Kwikspace and its business and always remains the property of the company.
- I agree that I shall not copy, duplicate (except for backup purposes as part of my job here at Kwikspace), or otherwise disclose, or allow anyone else to copy or duplicate any of this information or
- I agree that, if I leave Kwikspace for any reason, I shall immediately return to the company the original and copies of any and all software, computer materials, storage media or computer equipment that I may have received from the company that is either in my possession or otherwise directly or indirectly under my
- I agree to abide by the terms set out in the “Kwikspace Information Technology, Internet and Security End- user Policy” and to be bound thereby. I understand and accept that in appropriate circumstances that Kwikspace may monitor and access the information, data and e-mail on my
- I understand and agree that failure on my part to comply with the terms as set out in the “Kwikspace Information Technology, Internet and Security End-user Policy” and this acknowledgement form may result in disciplinary action being taken against
- This policy may be amended by the company from time to time and such amendments shall be brought to the attention of employees, including by posting same on company notice boards and/or by way of electronic mail, or by other
























