LEGACY CONTRACTS LLC TECHNOLOGY USE POLICY

LEGACY CONTRACTS LLC (the “Legacy”, “Company”) provides technology for use in the furtherance of its
business objectives. The purpose of this Technology Use Policy (the “Policy”) is to outline acceptable use of
technology at Legacy and to ensure the risks associated with inappropriate or unauthorized use of
computer technology are adequately managed to support business objectives.
For the purpose of this Policy, technology includes, but is not limited to, computers, laptops, mobile
devices, internet, software, systems, email, telephones, voice mail and related equipment (“Company
Technology”). Users of the Company Technology must respect the rights of other users, respect the
integrity of Company Technology and observe all relevant laws and regulations.
SCOPE
This Policy applies to all employees who use Company Technology (“Users”).
ACCEPTABLE USE
Legacy provides Company Technology to all employees for legitimate business purposes. Users are
expected to exercise good judgment and professionalism in the use of all Company Technology.
Incidental and occasional personal use of Company Technology is permissible as long as it does not
interfere with workplace productivity or Legacy’s systems or business operations, does not pre-empt any
business activity, does not consume more than a trivial amount of Legacy’s resources and is lawful. Users
should be aware that all use of Company Technology is subject to monitoring as described in this Policy
and as such, Users have no right to, or expectation of, privacy with respect to their use of Company
Technology, subject to applicable laws.
Notwithstanding the above, any use of Company Technology must be in accordance with the provisions
set out within this Policy.
Unacceptable Use
The relationship between Legacy and its Users is based on trust. This trust must be maintained at all
times as it is fundamental to the employment relationship. Users must, at all times, hold themselves to
the highest standards of conduct so as to maintain Legacy’s reputation and the integrity of Legacy’s
business.
Users shall not be permitted to use any of Company Technology to:
i. solicit or recruit for any non-job-related commercial ventures, religious or political causes,
outside organizations or other non-job-related solicitations;
ii. store, access, transfer, download, upload, communicate or create any fraudulent, harassing,
embarrassing, sexually explicit, profane, obscene, intimidating, libelous, slanderous,
threatening, abusive, defamatory, or otherwise unlawful or inappropriate materials;
iii. download entertainment software or games, or to play games over the Internet;
iv. access Internet sites for gambling or any illegal activity;
v. embarrass Legacy executives, or to jeopardize Legacy’s reputation;

vi. download, store or transmit material that infringe any copyright, trademark or other
proprietary right;
vii. post or transmit proprietary or confidential information related to clients, suppliers,
vendors, allied parties, or other third parties;
viii. post or store Legacy business-related information on public storage sites;
ix. download or distribute pirated software or data;
x. deliberately propagate a virus, malware, or any other malicious program code;
xi. send confidential Legacy information without prior authorization from the proper
authoritative manager. Such confidential information includes, but is not limited to, Legacy
copyrighted materials, trade secrets, intellectual property, proprietary financial
information, employee information, customer information, or other similar
materials that would be considered confidential in nature (“Confidential Information”);
xii. access, use or disclose Confidential Information without authority;
xiii. engage in activities for personal gain or a personal business, or for any commercial or
business purposes other than Legacy purposes;
xiv. perform any scanning or information gathering regarding Company Technology, including
the following: port scanning, security scanning, network sniffing, keystroke logging, or other
information gathering techniques, when not part of the User’s job function;
xv. violate any applicable laws;
xvi. send unsolicited email;
xvii. install or use peer-to-peer file-sharing programs or access those types of networks; or
xviii. use Legacy resources in a manner that violates applicable laws, including without
limitation, those laws relating to discrimination and harassment, privacy, financial disclosure,
intellectual property and proprietary information, defamation and criminal laws.
Users shall also not be permitted to use Company Technology to view, access, amend, update, change,
collect, use or disclose: (i) any personal information in Legacy’s possession or control; or (ii) any
Confidential Information without proper authorization. Users should report any suspected unacceptable
use of Company Technology to their Supervisor.
Any User who uses Company Technology for any of these unacceptable uses will be subject to discipline
in accordance with this Policy.
MONITORING
Legacy maintains ownership over all Company Technology and all data created, sent, received or stored
on or using Company Technology. Users should have no expectation of privacy with respect to their use
of Company Technology.
Subject to compliance with applicable laws, Legacy reserves the right to and may from time to time
inspect, access, audit, monitor and/or record Users’ use of and access to Company Technology and any
information accessed, created, modified, stored, sent, received, copied, manipulated or otherwise handled
in any way, by or through any Company Technology, at any time, in its sole discretion, without notice to
any User.
These actions will be performed only as reasonably necessary to ensure compliance with this Policy and
other Company policies, to detect and prevent loss or theft of Confidential Information, personal

information or other misconduct, to conduct investigations into suspected inappropriate or unlawful
activity, to meet legal disclosure and document production requirements, and other compliance
requirements.
SECURITY AND CONFIDENTIALITY
Legacy reserves the right to implement controls in respect of Company Technology at any time in its sole
discretion where it is deemed necessary to protect the security of Company Technology, Confidential
Information, personal information or other assets. Users may not block, uninstall or otherwise interfere
with such controls. Users must maintain basic controls to prevent Company Technology assets being lost
or stolen, potential security breaches, leaking of Confidential Information or personal information and
breaches of software licensing agreements.
Users must maintain confidentiality and exclusive control of authentication credentials (passwords,
tokens, certificates) used to access Company Technology. Credentials must not be shared with others at
any time or left in a place where an unauthorized person might find them. If a User has reason to believe
that his/her password has been compromised or discovered by another person, the User must
immediately inform his/her manager (if an employee) or if any other type of User, and change his/her
password immediately.
Users must exercise caution when opening attachments or selecting links (these can be contained in
electronic messages, blogs or social networks) from unknown sources as these may contain malicious
software (also known as malware, examples include viruses, worms and trojans).
Legacy reserves the right to revoke access to or use of any or all Company Technology any time in its sole
discretion. Access to Company Technology will be revoked when a User leaves Legacy.
All Company Technology resources must be returned to Legacy at the end of a User’s employment, or at
any time Legacy deems it necessary.
BREACHES, INVESTIGATIONS AND DISCIPLINE
All Users must comply with this Policy at all times and take care to ensure that their use of Company
Technology does not jeopardize the interests of Legacy, personal information in its custody or control, or
its Confidential Information. Users must immediately notify Legacy of any suspected breach of this
Policy. Legacy will investigate any reasonably suspected breach of this Policy promptly and impartially.
In the course of an investigation, Legacy may require a written statement from the User involved in or
with knowledge of the suspected breach, as well as an interview of any person with knowledge of the
incident, and collect any and all relevant and material documents and other evidence. Legacy may
involve investigators and experts where appropriate to investigate and report to Legacy.
A User may, in Legacy’s sole discretion, be suspended while an investigation is undertaken and
completed.
Confidentiality will be maintained through the investigation process to the extent practicable and
appropriate in the circumstances. Information obtained in connection with this Policy, including
identifying information about any individuals involved, will not be disclosed unless the disclosure is

necessary for the purposes of investigating or taking corrective action with respect to the incident, or as
otherwise required by law. However, Legacy may disclose certain information to the affected parties to
gather pertinent facts or answer allegations.
All Users are expected to cooperate fully in any investigation pursuant to this Policy. If, after
investigation, Legacy finds that a violation of this Policy has occurred, Legacy will determine what
remedial action should be taken to avoid future incidents and to ensure compliance with this Policy in
the future. Any such remedial action will be undertaken in accordance with this Policy.
Any and all breaches of this Policy will be treated with the utmost seriousness by Legacy. Any breach of
this Policy will result in discipline, up to and including termination of employment for just cause.
ADMINISTRATION
This Policy shall be administered in accordance with all applicable federal, provincial and local laws and
regulations. Legacy may amend this Policy from time to time, at its sole discretion. Users are responsible
for regularly reviewing this Policy.
Acknowledgement and Agreement
I, , hereby acknowledge that I have received, read
and understand Legacy’s Technology Use Policy and agree to comply with its terms. I understand that a
violation of this Policy may subject me to discipline, up to and including termination of my employment
for just cause.

Name:
Signature:
Date:

LEGACY CONTRACTS LLC DISASTER RECOVERY POLICY

Since disasters happen so rarely, management often ignores the disaster recovery planning process. It is
important to realize that having a contingency plan in the event of a disaster gives LEGACY CONTRACTS,
LLC a competitive advantage. This policy requires management to financially support and diligently attend
to disaster contingency planning efforts. Disasters are not limited to adverse weather conditions. Any
event that could likely cause an extended delay of service should be considered.
Purpose
This policy defines the need for management to support ongoing disaster planning for LEGACY
CONTRACTS, LLC.
Scope
This policy applies to the management and technical staff of LEGACY CONTRACTS, LLC.
Contingency Plans
The following contingency plans must be created:
i. Computer Emergency Response Plan: Who is to be contacted, when, and how? What
immediate actions must be taken in the event of certain occurrences?
ii. Succession Plan: Describe the flow of responsibility when normal staff is unavailable to
perform their duties.
iii. Data Study: Detail the data stored on the systems, its criticality, and its confidentiality.
iv. Criticality of Service List: List all the services provided and their order of importance. It also
explains the order of recovery in both short-term and long-term timeframes.
v. Data Backup and Restoration Plan: Detail which data is backed up, the media to which it is
saved, where that media is stored, and how often the backup is done. It should also describe
how that data could be recovered.
vi. Equipment Replacement Plan: Describe what equipment is required to begin to provide
services, list the order in which it is necessary, and note where to purchase the equipment.
vii. Mass Media Management: Who is in charge of giving information to the mass media? Also
provide some guidelines on what data is appropriate to be provided.

Placing Plans into Action
After creating the plans, it is important to practice them to the extent possible. Management should set
aside time to test implementation of the disaster plan. During these tests, issues that may cause the plan
to fail can be discovered and corrected in an environment that has few consequences. Updating Plans
Review all plans annually so changes in LEGACY CONTRACTS, LLC’s situation can be incorporated.
Enforcement Any employee that violates this policy may be subject to disciplinary action up to and
including termination of employment.

Definitions
 Disaster: Any event that could likely cause serious disruption of the Information Technology
systems, including, without limitation, weather events, power events, or acts of terrorism.
Revision History
A history of revisions to this Plan will be maintained by LEGACY CONTRACTS, LLC

At Legal writing experts, we would be happy to assist in preparing any legal document you need. We are international lawyers and attorneys with significant experience in legal drafting, Commercial-Corporate practice and consulting. In the last few years, we have successfully undertaken similar assignments for clients from different jurisdictions. If given this opportunity, The LegalPen will be able to prepare the legal document within the shortest time possible. You can send us your quick enquiry ( here )