Access to this page has been blocked in accordance with company policy.

Please contact MHC Security Team at networksecurity@mhc.com if you believe this is in error.
 User: 34.232.62.209
 URL: http://216.58.236.17/trucks/search/used-trucks/kenworth-t660s?f_locationbranch=0333cb91e09b4ce0be0cdf653164aaa8%26f_locationbranch=282508616c1a4fe3b5c224037387eead%26f_locationbranch=2cb11240ee0244d89acf9b32e455a531%26f_locationbranch=315bd9c7dcf84bcaa56ce084b759c5d0%26f_locationbranch=3585e239e8284d6bb613a19f264dead3%26f_locationbranch=443643952a0e4f09ad4a360b5b55e390%26f_locationbranch=598b7a41388941f5bf5646406d65df24%26f_locationbranch=63ed7637aadd439f9eaa9cf5f3efb767%26f_locationbranch=643fb2ac09e4492288b35ea5b11dddd3%26f_locationbranch=65bb47fce2c1463695a815f9775a4f92%26f_locationbranch=7f6ad1776479415a944b0cd61b7de16a%26f_locationbranch=827a2cbd08de4587b7814ffbfa88296d%26f_locationbranch=9fb2dfb0055c49249b7a4595d66384c8%26f_locationbranch=ad47c7f2c9004ec29f16e444b9c0b
 Category: unknown

*** This highlighted Section needs to be included in your email. ***

If you feel this page has been incorrectly blocked, you may click Continue to proceed to the page. However, this action will be logged.

Return to previous page

COMPUTERS, E-MAIL AND INTERNET POLICY
Murphy-Hoffman Company and its wholly owned subsidiaries (hereinafter referred to as Company), is responsible for securing its network and computing systems against unauthorized access and/or abuse. This responsibility includes informing users of expected standards of conduct and the ramifications for failure to adhere to them. This policy governs the use of Company-owned computers, e-mail systems, and Internet access via Company computers and/or data lines.
 
COMPANY PROPERTY
All company computers, e-mail facilities, and Internet access accounts are the Company's property to be used solely to facilitate the business of the Company. In addition, all software that has been installed on Company computers and any data collected, downloaded and/or created on Company computers is the exclusive property of the Company and may not be copied or transmitted to any outside party or used for any purpose not directly related to the business of the Company. Upon termination of employment, no employee shall remove any software or data from the Company-owned computers.
 
COMPUTERS, INTERNET AND E-MAIL POLICY
Employees are strictly prohibited from using Company computers, Internet access and E-mail for personal reasons or for any improper purpose. Some specific examples of prohibited uses include but are not limited to:
  • Sharing your user ID and/or password with any other person. In the event that you share your user ID or password with another person, you will be solely responsible for the actions of the other person.
  • Using another person's user ID to perform any unauthorized activity.
  • Use of Company computers and/or networks in attempts to gain unauthorized access to another system.
  • Deletion, review, copying, or modification of files and/or data belonging to another user without their consent.
  • Copying and/or distributing data, regardless of source or format, without the approval of the Company.
  • Copying of copyrighted materials, such as third-party software, without having proper license or written consent of the owner.
  • Any attempts to secure a higher level of privilege and/or authority without the approval of the Company.
  • Use of facilities and/or network computing resources for commercial purposes other than that directly associated with the Company.
  • Any unauthorized, deliberate action that damages or disrupts a computing system or its data, alters its normal performance, or causes it to malfunction.
  • The willful introduction of computer viruses or other disruptive/destructive programs into the network and computing systems or other external networks.
  • Dissemination or printing of copyrighted materials (including articles and software) in violation of copyright laws.
  • Sending, receiving, printing or otherwise disseminating proprietary data, trade secrets or other confidential information of the Company, in violation of company policy or proprietary agreements.
  • Making threatening or harassing statements to another employee, vendor, customer or other outside party.
  • Transmitting retrieving, downloading, or storing messages or images relating to race, religion, color, sex national origin, citizenship status, age, handicap, disability, sexual orientation, or any other status protected under federal, state and local laws.
  • Sending or soliciting sexually oriented messages or images.
  • Operating a business, usurping business opportunities or soliciting money for personal gain, or searching for jobs outside of the Company.
  • Sending chain letters, gambling, or engaging in any other activity in violation of local, state or federal laws.
  • Playing electronic games and/or monitoring sports scores
  • Attempts to read, delete, copy or modify the electronic mail of other users without proper consent.
  • Use of electronic mail for commercial purposes other than that directly associated with the Company.
 
SYSTEM INTEGRITY
Since E-mail is the primary conduit for the distribution of computer viruses, you need to demonstrate extreme caution when opening mail, especially from unknown people or organizations. Furthermore, because disks from outside sources may contain viruses, employees are not permitted to use or load personal disks or copies of software or data in any form on Company computers without first, (1) receiving permission from the Information Systems Department and second, (2) having the disk or data scanned for viruses by the Information Systems Department. Any employee who violates this policy and as a result introduces a virus into the Company's system shall be deemed guilty of gross negligence and/or willful misconduct and will be held responsible for the consequences, including but not limited to the cost of repair or lost productivity.
 
MONITORING
Employees should expect that all information created, transmitted, downloaded, received or stored in Company computers may be accessed by the Company at any time without prior notice or consent. Employees should not assume that they have an expectation of privacy or confidentiality in such messages or information (whether or not such messages or information is password-protected), or that deleted messages are necessarily removed from the system.
 
ENFORCEMENT
Any attempt to violate the provisions of this policy will result in disciplinary action, up to and including the termination of employment. Employees who misappropriate copyrighted or confidential and proprietary information, or who distribute harassing messages or information, may be subject to criminal prosecution and/or civil money damages.