In Our Business
37

for the intended business use only and protect it appropriately. Schering-Plough has the right to access, store and review all communications, records and information created at work or with Company resources.

This means:

  • Using Company computers responsibly and primarily for legitimate business purposes. Personal use (including accessing the internet) should be kept to a minimum and not diminish productivity or other job-related performance.
  • Protecting the security of computer systems, including corporate data, electronic communications and application software at all times.
  • Not engaging in electronic communications that might be considered offensive, derogatory, defamatory, harassing, obscene or otherwise vulgar.
  • Never using Company electronic communications systems to improperly disseminate copyrighted or licensed materials.
  • Always protecting information used to access Company networks, including user names and passwords.

Q. I am working with a vendor who wants me to send them some confidential information for analysis. Is it okay for me to send this information via e-mail?

A. Yes, you may send the information via e-mail but additional precautions must be taken to protect confidential information transmitted outside of the Company. Contact your local IT department for alternatives that would allow you to send the data safely.

Q. What should I do if I suspect a security breach of Company computers or data or my password has been compromised?

A. You should immediately notify your local IT department or the Office of GIT Security. You may also contact the Integrity Action Line.

spacer

Copyright 2007 Schering-Plough