EVO Security Awareness and Acceptable Use Policy

Overview

Effective security is a team effort involving the participation and support of everyone who deals with sensitive information and/or information systems. It is the responsibility of every user accessing EVO’s networks and systems to know these guidelines, and to conduct their activities accordingly. Every computer or mobile device accessing EVO’s network is expected to do so solely for legitimate, business purposes that have been specifically approved by EVO.

Purpose

The Acceptable Use policy defines the components, controls and procedures for managing and using EVO’s network and system resources. The underlying metrics for this policy are based on risk assessments of the various components. The goal of the policy is to define who can access a resource, when they can access it; and what permissions they have. Thus serving as an outline of the end-users’ responsibilities. These rules are in place to protect our business partners and employees. Inappropriate use exposes everybody to risks including service reliability, legal issues, malware and compromise of network systems and services.

Scope

This policy applies to everyone accessing EVO’s networks and systems. Unacceptable Use Unacceptable Activities pertains to any activity not conforming to the purpose, goals, and mission of EVO Payments International. Under no circumstances individuals accessing EVO networks or systems are authorized to engage in any activity that is illegal under local, state, federal or international law while utilizing EVO’s networks and systems.

Policy General Use and Ownership