Electronic Communications Policy
The PT. Mandiri Tunggal Sejahtera Berkarya / MTS Group Holding, LLC. (“Company“, “We“, “Us“, “Our“) ’s electronic communication systems such as voice mail, e-mail, portal, platform, website, mini-site, application, computers, network and Internet access systems, both internal and external, are to be used primarily to advance the Company purposes. The Company recognizes that user freedom is an essential aspect of the Company mission and will interpret and also carry out this policy so as to respect that principle. The Company will also endeavor to interpret and carry this policy in a manner consistent with its various obligations to employees under existing collective bargaining agreements.
Communications transmitted through these systems should have a legitimate Company-related business purpose and pass the Company’s Security Commitment article Electronic Communication Transmission selection. These electronic communications resources may only be used for Company-related business purposes and may not be used in any manner or for any purpose which is illegal, dishonest, disruptive, threatening, damaging to the reputation of the Company, inconsistent with the mission of the Company, or likely to subject the Company to liability. The use of Company electronic communications systems or facilities for private or personal commercial purposes is strictly prohibited, including any sort of non-Company related solicitation.
The Company acknowledges that occasionally employees, divisions, and other employees use Company electronic communications systems assigned to them for personal, not a business-related use. Eg. buying somethings from their relate account from world-wide. Such occasional personal-relate to themselves uses are permitted if they are not excessive, do not interfere with the performance of the employee or division member’s duties, do not interfere with the efficient operation of the Company or its electronic communications resources, and are not otherwise prohibited by this policy or any other Company policy or directive.
The Company’s existing policies prohibiting harassment apply to the use of all Company electronic communications systems. Therefore, the electronic communications systems are not to be used in any way which has the effect of unreasonably interfering with anyone else’s personality or work performance or which creates an intimidating, hostile, or offensive educational or work environment (whether or not based upon race, color, gender, disability, religion, national origin, sexual orientation, or age). Sending unwanted and/or offensive e-mail messages may constitute harassment if they are persistent enough to create an intimidating or hostile environment. Impermissible harassment also includes making unwelcome sexual advances and requests for sexual favors which might be perceived as explicitly or implicitly affecting educational or employment decisions concerning an individual.
Electronic communications systems also shall not be used to post or send obscene, pornographic, sexually explicit, or offensive material unconnected to an employee’s job responsibilities, company performance, or non-commercial pursuits. Nor shall the electronic communications systems be used to commit fraud or misrepresentation, to libel or slander anyone, or to facilitate any unauthorized copying or transmission of copyright protected materials.
In addition, employees should not attempt to disrupt electronic communications, to violate computer system security, or to gain access to another employee’s personal electronic files or e-mail messages without the latter’s expressed permission. System administrators perform periodic security and maintenance checks of the Company electronic communications systems, facilities, and other computing resources that may include random examination of individual files or messages.
As a matter of routine system maintenance, the Company may store electronic communications on magnetic media for a period of time after the communication is created. With reasonable cause or whenever there is a business need to do so, Company management reserves the right to inspect and examine any Company owned or operated communications system, electronic resource, and/or files or information contained therein without prior notice. No inspection or examination of files or information contained therein will be conducted in violation of applicable medical or psychological confidentiality statutes.
The contents of any electronic resource, message, and/or files or information which has been inspected under this policy will not be used or disseminated more widely than is necessary.
Violation of any portion of this electronic communications policy may result in disciplinary action. In cases of willful, flagrant, or repeated violation of this policy, the disciplinary action may include termination.
Protecting Security Information
Electronic Mail as Electronic Communication
Due to the sensitive nature of security information, the Company provides a method for user to:
- Verify the authenticity of security notifications.
- Encrypt messages to send to the Company via firstname.lastname@example.org.
Obtain PGP software
PopIt Snack Platform’s Security key
This is Our PGP key which is valid
Key ID: EF8BF87E4CA53FE969E313E9B566CFB0DCA105CD
Key Type Alogarithm: PGP Key RSA-4096bit
Key Length: 4.096
Fingerprint: D1B1 34C1 C79B 781E CB5B 97C3 277D EB69 1F80 67AA
-----BEGIN PGP PUBLIC KEY BLOCK-----
Comment: EF8B F87E 4CA5 3FE9 69E3 13E9 B566 CFB0 DCA1 05CD
Comment: PopIt Snack (PopIt Snack Information Technologies and S
-----END PGP PUBLIC KEY BLOCK-----
UserID: DCA105CD email@example.com
Download asc from openpgp.org: PGP Key
Download asc from local server: PGP Key
Our PGP key has an operational life span of one year. When We generate a new key, it will be available from this platform. Our previous PGP keys are archived to facilitate the validation of previously-signed messages.
Check Our PGP signature on mail messages and documents
Documents developed by the Company security team are signed with the PopIt Snack Platform’s PGP key. We encourage you to check the signature to ensure that the document was indeed written by Our staff and has not been changed.
Note for users of the security-announce mailing list:
Some mail programs cause changes to messages, resulting in an indication that the PGP signature is not good. Critical information will also be posted to Our platform along with a PGP signature, providing you with a confirmation of authenticity.
Encrypting sensitive information
When sending sensitive security information by email, please encrypt it.
Self Destructing Security Information
Electronic Mail as Electronic Communication
For Internal Workers Notice
You can set an optional expiration time on Company’s encrypted emails, so they will be automatically deleted from the recipient’s inbox once they have expired. This technology works for both emails sent to other Company users along Company Network, and encrypted emails sent to non-company mail email addresses. We’ve added a way for you to have ephemeral communication.