6.1. The use of information technology for business purposes.
6.1.1. The Supplier’s employees, who are users of IT systems provided by Budimex, may occasionally use the said resources for private purposes. This type of use must not interfere with the performance of official duties and be contrary to Budimex’s interest.
6.1.2. The Supplier may not use the resources of the IT Systems provided by Budimex for gainful employment for an entity other than Budimex.
6.2. Control access to information from electronic sources.
6.2.1. Control of access to information stored in Budimex IT Systems is mandatory. For each System, Users are granted access authorization to the extent necessary to perform their work.
6.2.2. Access is controlled by means of individual identifiers and passwords, which clearly identify the User in the IT System and protect against unauthorized access.
6.2.3. Passwords are created according to specific rules regarding their length, structure and frequency of changes.
6.2.4. Passwords must be kept secret and must not be disclosed to others. If the User performing the Provider’s obligation provides the password to another person, the Provider remains fully responsible for the inviolability and confidentiality of the information entrusted to him. Password protection is in the interest of both Budimex and the Supplier.
6.2.5. The User whose ID and password have been used to gain unauthorized access to the IT System shall be considered as the person who has used the resources of this System in an unauthorized manner.
6.2.6. If you leave your workstation for a while, lock the computer console (e.g. in Windows use the CTRL-ALT-DEL + ENTER keys) to prevent unauthorized use of the computer.
6.2.7. In the case of adding new Users to the IT System, Budimex’s consent is required.
6.2.8. Budimex will change the User’s password only on the basis of the request of an authorised person, without disclosing the previous password.
6.2.9. It is forbidden to use IT Systems owned by Budimex or third parties without the consent of the person who is authorised to issue such permits.
6.3. Protection of the shared resources of the Information Systems.
6.3.1. The Supplier may not modify devices belonging to Budimex, e.g. by installing computer components, software or in any other way without the written authorisation of the Budimex employee responsible for it.
6.3.2. The supplier should constantly take care of the Budimex equipment entrusted to him, and in particular take care of protection against theft, prevent damage during transport or handling, properly store at the right temperature and not expose it to magnetic fields or bad weather conditions.
6.3.3. Particular care should be taken when handling materials on exchangeable media (e.g. CD-ROM, etc.) which have been created or used outside the Budimex IT System. Media from a dubious or unknown source cannot be used on equipment owned by Budimex. All such materials should be scanned with an antivirus program and/or tested by the Budimex IT Office before use.
6.3.4. All software installations on Budimex computers are carried out by Budimex. Only with the written consent of Budimex can the installation of legal software for business use by persons who are not Budimex employees be carried out.
6.3.5. Installation and/or use of private software/files on IT equipment entrusted by Budimex is prohibited.
6.3.6. The computer equipment entrusted by Budimex must always be present and active with the latest version of antivirus software provided by Budimex. The instructions provided by Budimex regarding virus prevention and possible elimination of viruses that have penetrated the Budimex IT System must be followed. If an incorrect operation of the antivirus program is noticed, the User must immediately report this fact to the Budimex IT Office.
6.3.7. Any identified cases of threat, breach and weakening of the security of IT Systems or the operation of software unauthorised by Budimex (security incidents) must be immediately reported to the Budimex IT Office.
6.4. Sending messages electronically.
6.4.1. Budimex’s corporate electronic mail, which may be made available to users for whom the Supplier is responsible, is an official means of communication in Budimex and is treated as business mail.
6.4.2. The User, for whom the Supplier is responsible, may not present private opinions and judgments as Budimex’s position when sending messages by electronic means.
6.4.3. Only electronic message exchange systems approved by Budimex can be used on computers entrusted by Budimex.
6.4.4. On computers entrusted by Budimex, external services provided via the Internet (e.g. Hotmail, Yahoo, WP, ONET, chat and instant messengers, etc.) cannot be used to send or receive messages.
6.4.5. In order to prevent the operation of malicious software (e.g. viruses) that may get into the Budimex IT System, it is necessary to immediately delete any unexpected mail with attachments from an unknown sender. Attachments in such a message cannot be opened.
6.4.6. The distribution of e-mails in the Budimex corporate e-mail system must be limited only to persons who should know their content or to persons directly related to the content of the message. Distribution lists should not be used except when all recipients meet the above criteria.
6.4.7. In the Budimex corporate e-mail system, it is necessary to avoid sending messages with large attachments to a large group of people via distribution lists. You should use the compression software provided by Budimex to limit the size of large attachments and/or send several messages.
6.4.8. The size of the entrusted Budimex corporate mailbox is limited by the limit. The User, for whom the Provider is responsible, is obliged to regularly delete outdated messages.
6.5. Internet.
6.5.1. In order to provide the services covered by the agreement, it may be necessary for Budimex to provide the Supplier with access to the Internet. Such access will be subject to the restrictions of the Budimex SA Information Security Policy Access to the Internet from the devices and/or infrastructure made available by Budimex is permitted only through solutions provided and approved by Budimex.
6.5.2. Under no circumstances may the User, for whom the Supplier is responsible, connect the equipment entrusted to him to the Internet or other networks via cables, dial-up modems or wirelessly without the safeguards required by the applicable Information Security Policy of Budimex SA Each connection to a computer network not belonging to the Budimex Group of computer equipment entrusted by Budimex must be individually approved by Budimex.
6.5.3. Budimex reserves the right to monitor all types of Internet connections involving devices connected to Budimex IT Systems and to block access to services and websites that are deemed to be inconsistent with the Information Security Policy of Budimex SA
6.5.4. The User for whom the Provider is responsible may not:
- Attempt to bypass security, access control, or content filtering mechanisms on the Internet exit gateway
- deliberately disrupt the functioning of the network, e.g. by sending computer viruses, using hacking practices and sending large amounts of data blocking the network and hindering the work of other users,
- disclose or publish secret or proprietary company information over the Internet, such as: financial information, new ideas or ideas related to the company, marketing strategies and plans, databases and information contained therein, customer lists, software source codes, computer/network access codes and business affiliations, etc.;
- use the Internet, e-mail or other tools in order to create legal or contractual obligations without the required authorisation of the Management Board of Budimex,
- use resources in another improper manner specified by Budimex.
6.6. Inappropriate material.
6.6.1. The Supplier may not use the computer equipment, devices and rooms provided by Budimex to view, process, create and/or distribute materials among employees or anyone outside Budimex that contain content:
- related to discrimination (racial or otherwise),
- harassment (sexual or otherwise),
- threatening,
- Obscene
- Pornographic
- Defamatory
- Illegal
6.6.2. The Supplier is obliged to immediately destroy/remove the materials specified in pt. 6.6.1 received from anyone and to request the Sender to cease such practices in the future. You should also immediately inform the Head of Consumer Protection. Security of Budimex SA IT Systems about the details of the incident, together with the sender’s e-mail address, subject and actions taken.