Monitoring Of Walmart Information Resources

1379 WordsApr 23, 20176 Pages
12-3.1 What We Monitor Monitoring of Walmart information resources may include, but is not limited to, the following: Network traffic. Application and data access. Keystrokes and user commands. E-mail and Internet usage. Message and data content. Unauthorized access points. 12-3.2 User Agreement to Monitor Any use of Walmart information resources constitutes consent to monitoring activities that may be conducted whether or not a warning banner is displayed. Users of Walmart information resources: Agree to comply with Walmart’s policy concerning the use of information resources. Acknowledge that their activities may be subject to monitoring. Acknowledge that any detected misuse of Walmart information resources may be subject to disciplinary…show more content…
Provide notification of monitoring. Be followed by a pause requiring manual intervention to continue. Identify the information resource as a Walmart information resource and alert users that they have no expectation of privacy. Warn users that activities may be monitored and that unauthorized access is prosecutable pursuant to the United States Criminal Code (Title 18 U.S.C. § 1030). Deviations from the authorized standard warning banner are not allowed unless approved in writing by the manager, CISO. 12-3.4 Requesting and Approving User Monitoring Requests Requests for monitoring network traffic, application and data access, keystrokes and user commands, and e-mail and Internet usage must be in writing and directed to the manager, CISO. Requests for monitoring message data content or Internet usage must be in writing and directed to the Chief Privacy Officer (CPO). Approvals The manager, CISO, has the responsibility to authorize in writing monitoring or scanning activities for network traffic, application and data access, keystrokes and user commands, and e-mail and Internet usage for Walmart’s infrastructure or information resources. Personnel (except the Inspection Service and OIG) must receive authorization from the CISO prior to conducting monitoring and scanning activities. The CPO has the responsibility to authorize, in writing, requests for message data content, or Internet usage monitoring. The Information Catalog Program (ICP) Office is
Open Document