Acceptable Use Policy
Rules governing the acceptable use of SOLV(X) systems, devices, and network resources
This Acceptable Use Policy ("Policy") sets out the rules for using SOLV(X)'s technology systems, devices, and network resources. It applies to all employees, contractors, and third parties with access to SOLV(X) systems.
Scope
This Policy applies to:
- Company-owned and personal devices used to access company systems
- The company network (on-site and VPN)
- Cloud services and software-as-a-service tools provided by SOLV(X)
- Company email accounts and communication platforms
Acceptable Use
You may use company systems for:
- Work directly related to your role and responsibilities
- Incidental personal use that doesn't impact productivity or security
- Participation in company-approved professional development
Prohibited Activities
The following are strictly prohibited:
Security Violations
- Attempting to bypass security controls or access systems you're not authorized to use
- Installing unauthorized software on company devices
- Sharing credentials with others or using others' credentials
- Disabling security software (antivirus, firewalls, device management)
Data Handling
- Storing confidential company data on personal devices or unauthorized cloud services
- Sharing confidential information with unauthorized parties
- Circumventing data loss prevention controls
Inappropriate Content
- Accessing, creating, or distributing pornographic, hateful, or otherwise offensive content
- Using company systems for harassment, discrimination, or bullying
- Sending spam or unsolicited bulk communications
Legal Violations
- Downloading or distributing pirated software, music, or other media
- Using company systems for illegal activities of any kind
- Violating third-party intellectual property rights
Violations of this policy may result in disciplinary action up to and including termination of employment. Serious violations may be referred to law enforcement.
Monitoring
SOLV(X) reserves the right to monitor activity on company systems to ensure compliance with this policy and applicable laws. Employees have no expectation of privacy when using company systems.
Reporting Violations
If you observe a violation of this policy, report it to:
- Your manager
- IT Security:
security@acmecorp.com - Anonymous hotline: details available in the HR portal
Reports made in good faith will not result in retaliation.
Enforcement
Violations will be investigated and may result in:
- Verbal or written warning
- Suspension of system access
- Termination of employment
- Civil or criminal proceedings
The severity of the response will depend on the nature and intent of the violation.
Review
This policy is reviewed annually by the IT Security and HR teams. Last reviewed: February 2026.
Contact
Questions about this policy should be directed to security@acmecorp.com.