Você está na página 1de 28

Technology Report July 2007

Trend Micro™
InterScan Web Security Suite
Content Filtering
Technology Report
Trend Micro™ IWSS

Vendor Details

Name: Trend 
Address: Trend Micro Inc., 10101 N. De Anza Blvd, Cupertino,
CA - 95014, USA
Telephone: + 1 (800) 228 5651 or + 1 (408) 257 1500 
Website: www.trend.com
Product: InterScan Web Security Suite 2.5 for Windows

Test Laboratory Details

Name: West Coast Labs, Unit 9 Oak Tree Court, Mulberry Drive
Cardiff Gate Business Park, Cardiff, CF23 8RS, UK
Telephone: +44 (0) 29 2054 8400 

Date: July 2007


Issue 1.0
Author: Richard Thomas

Contact Point

Contact names: Matt Garrad, Richard Thomas


Contact telephone number: +44 (0) 29 2054 8400

Content Filtering Technology Report www.westcoastlabs.com 2


Trend Micro™ IWSS

Contents

Why content filtering is essential 4

Test Objectives and Methodology 7



Checkmark certification 9

The Product 10

Test Report 11

Test Results 17

West Coast Labs Conclusion 18

Security features Buyers Guide 19

Sample Acceptable Usage Policy 24

Content Filtering Technology Report www.westcoastlabs.com 3


Trend Micro™ IWSS
Introduction

Why content filtering is essential


For all its obvious advantages, the internet has created a lot of prob-
lems for companies, governments and individuals. The provision of
cheap, global communications and access to the World Wide Web
brings undeniable benefits but can also be a channel for all sorts of
criminal and offensive activity. So how do we keep the benefits while
preventing the less savory aspects? There are no easy answers.

Internet purists, for instance, claim that traffic should be free to flow
and that any form of control or censorship goes against the funda-
mental principles that have made the internet such a force in the
world.

On the other hand, governments argue that it is their duty to monitor


traffic. As we know, the internet is a convenient vehicle for all sorts of
criminal activity, from international terrorism to money laundering. To
allow those communications to go unchecked would be irresponsi-
ble, as most people would agree.

Equally, few people would argue that hard-core pornography,


particularly that involving children, should be allowed to travel un-
checked over the internet. But then we start to get into gray areas.
For example, while some societies may be comfortable with bare
flesh and fruity language, others may find it offensive.

Attitudes to freedom of expression will also vary from society to so-


ciety, and will tend to change over time. Remember that racist and
sexist jokes were commonplace in the 1960s and 1970s but are now
widely frowned upon in most Western societies.
So for most of us, a certain level of control and monitoring of email
traffic and internet access are acceptable and even desirable. The

Content Filtering Technology Report www.westcoastlabs.com 4


Trend Micro™ IWSS
Introduction

only question is, how much. In some sectors, there are hard-and-fast
rules to help. Schools, for instance, need to show a duty of care for
their students, and must prevent them receiving indecent messages
or accessing inappropriate websites.

Companies also have a duty of care to their employees to protect


them from unwanted material in the workplace, and they may have
additional regulations to follow according to their particular industry
sector.

Most companies will also want to protect confidential information


from leaking out to competitors, which can easily happen in a free-
flowing networked environment. Furthermore, the penalties for fail-
ing to show due care can be severe. In a recent notorious case, for
example, a New England schoolteacher faced a jail term of up to 40
years for displaying lewd images on a classroom computer, although
doubts over the computer’s security protection have now forced a
retrial.

Several companies have also faced lawsuits from employees be-


cause they failed to prevent racist or other offensive material from
circulating on the corporate network. The employees argue they
have a right to work in a clean environment, and that their employers
should take reasonable steps to ensure it happens.

The stakes for organizations are therefore high and rising, and they will
also differ according to company size, industry sector and prevailing
social attitudes. Fortunately, technology has advanced and provides
a wide range of tools to help companies manage their email and
web traffic to meet their specific needs. Equally important, the proper
deployment of these tools can demonstrate a genuine will to comply
with regulations and to protect users.

Content Filtering Technology Report www.westcoastlabs.com 5


Trend Micro™ IWSS
Introduction

In reality, though, no technological solution alone will guarantee


complete success. The criminals and purveyors of illicit material are
constantly seeking new ways to avoid detection – image spam being
just one recent example.

The developers of security products continue to build extra intel-


ligence into their systems to keep abreast of the changing threat
landscape, but this is a cat-and-mouse game that shows no sign of
ending.

All companies can do is train their staff well, deploy the right tools
intelligently and make sure their defenses are kept up to date. This re-
port is intended to help you choose the best product for your needs.

Content Filtering Technology Report www.westcoastlabs.com 6


Trend Micro™ IWSS
Test Objectives and Methodology

The objective of this Technology Report is to provide an independent


validation of web filtering effectiveness with particular reference to:

• The features, functionality and performance of the solutions.


• The extent to which an acceptable usage security policy (AUP) is
enforced.
• The level of false positives recorded (innocent actions blocked or
prohibited).
• The completeness and accuracy of the logs produced.

The Web Filtering testing utilises a piece of proprietary software written


by West Coast Labs to sequentially load in URLs from a test suite to a
well-known browser window. This ensures that the content of any site in
the list is accessed in the same way that an end user would load it in.

The URL test suite is regularly updated to include web sites that fall
outside of a predefined Acceptable Usage Policy (see Appendix 1),
and also includes various innocuous sites as “controls”.

The list may also include not only some sites that may trigger false
positives such as teenage sex education sites, but also a small
proportion of “zero-day” URLs published on the day of testing that are
made up entirely of Adult or Pornographic content - these may vary
from test to test.

The proprietary software is installed upon one or several machines on


an internal network and switches through the list changing web pages
at a standard interval until it either runs out of URLs or receives an END
command.

For monitoring purposes, the HTML code from each web page is
appended to a log. Test engineers will then analyze the logs to
ascertain if any pages have been passed through the solution and if

Content Filtering Technology Report www.westcoastlabs.com 7


Trend Micro™ IWSS
Test Objectives and Methodology

so, whether they should have been allowed.

In order to accurately assess the capabilities of the solution under test,


each URL in the test set has a category already preassigned, the Adult
/ Pornography classification might include such URLs as http://www.
playboy.com. For the purposes of result presentation, this is referred to
as the Base Group.

Each classification supplied by the solution under test is then


compared to the original Base Group classification to see if they
provide a match. All Base Group classifications given to URLs by West
Coast Labs are peer-reviewed to ensure accuracy.

Further attempts to access material will be manually with well-known


proxy avoidance services and results will be recorded. West Coast
labs will also comment on the ability of the solution under test to alter
policies at group or individual level.
It is expected that attempts to access web sites outside the terms of
the AUP will be blocked, and that all such attempts will be logged and
recorded.

Content Filtering Technology Report www.westcoastlabs.com 8


Trend Micro™ IWSS
Checkmark Certification

The Checkmark Certification is one of the world’s leading


and fastest-growing certification systems. Used by a
large number of leading security technology vendors, it is
highly regarded as an independent validation of product
performance and effectiveness.

Pass Criteria
Two levels of Checkmark URL Filtering Certification can be achieved
through this Technology Report test program.

Checkmark PREMIUM Certification for URL Filtering


• 100% of all attempts to access web sites outside the terms of the AUP
should be blocked and that such attempts will be logged.

Checkmark STANDARD Certification for URL Filtering


• Over 95% of all attempts to access web sites outside the terms of
the AUP should be blocked and that such attempts will be logged.

www.check-mark.com

Content Filtering Technology Report www.westcoastlabs.com 9


Trend Micro™ IWSS
The Product

Introduction

InterScan Web Security Suite, or IWSS for short, is an enterprise level


solution from TrendMicro. This is a software-based solution, and is
available for the three major operating systems - Windows, Linux, and
Solaris. The Windows version may be installed on either a Windows
2000 or 2003 server, while supported Linux platforms include RedHat
Advanced Linux Server, SuSE Linux Professional, and RedHat Enterprise.
This report is based upon tests carried out on the Windows version.

Basic hardware requirements for the solution are relatively low,


approximately matching those of a medium to high-end desktop
machine. Trend’s IWSS also supports the use of SQL Server 2000, and
includes an installation of Microsoft Desktop Engine, or MSDE.

Content Filtering Technology Report www.westcoastlabs.com 10


Trend Micro™ IWSS
Installation and Configuration

Installation of the solution is straightforward and requires little in the way


of prerequisites. During testing, engineers installed IWSS on a standard
Windows 2000 Server machine running Service Pack 4. When installing,
the administrator may choose from a list of components to be included
- amongst these are the scanners for HTTP and FTP as well as the URL
Filtering component.
The provision of these options allows for a customized installation that
may be tailored to suit the needs of the respective company. Clear
descriptions are available for each of the components, allowing the
administrator to make an informed choice.

The administrator is able to either install IWSS


onto the local machine or to remotely install it
elsewhere on the network, providing they have
the required network privileges over the target
server. A short series of tests are run by IWSS to
ensure that the target machine, regardless of
whether it is a remote machine or local, reaches
the basic system requirements, ensuring that a correct installation can
proceed.

At this point the administrator is presented with further customization


options, including the ability to assign the mode of operation as simple
transparency or otherwise. This will prove to be a key feature to many
administrators as it enables greater flexibility in the positioning, and
indeed the machine selection, of IWSS. The remaining steps required
to complete the installation are the insertion of standard networking
details such as Host names, DNS servers, and Gateway addresses.

Content Filtering Technology Report www.westcoastlabs.com 11


Trend Micro™ IWSS
Operations and Features

Interaction with IWSS is carried out via an SSL-secured web-based


interface. Once logged in, the administrator is presented with a
clear and concise display that provides all the information and
configuration options needed to get the most from the solution.
The interface is responsive and designed in such a way that the
administrator can quickly move between various screens with little
delay or unnecessary navigation.

Configuration options
for IWSS are easily
accessible and include
enough information to
make the administrator
aware of the effect of
selecting or changing
each option. Should the
administrator require
further information
on any of the options,
a useful Help index is
readily available in the
upper right corner of the
interface.

To further aid in the configuration of URL Filtering, IWSS provides the


administrator with six major groupings into which each category of
URL may be placed. Included amongst these are Not Work Related,
Company Prohibited Sites, and Possible Research Topics. These six
fields allow for a customized and measured approach when choosing
whether to block or allow each of the URL categories, for example
placing “Adult” sites into the Company Prohibited Sites group.

Content Filtering Technology Report www.westcoastlabs.com 12


Trend Micro™ IWSS
Operations and Features

Another useful option


is that of Work Time
Settings. The company
may define the start
and finish times of the
employees, as well as
a designated lunch
break. This allows for URL
categories, for example
news websites or travel
sites, to be accessible
during lunch breaks or
perhaps after working
hours, whilst blocking
them the rest of the time.

Various exceptions may be defined for those companies that deal


with topics, words, or phrases that may commonly be classified as not
work related, or perhaps unnecessary such as medical terms. These
exceptions may be entered as either website URLs, words that may
appear in a requested URLs, or as Strings. The latter allows for specific
pages to be viewable while blocking the rest of a website and offers
a more granular approach to web access control. If the administrator
already has a maintained list of allowed URLs, these may also be
imported into IWSS.

The categorization of URLs is kept current by a series of automated


updates that are carried out on either a daily or weekly basis. If the
administrator wishes to set this option to weekly, then they may then
also select on which day the update should occur. Both the daily and
weekly options include the ability to specify the time at which updates
should be downloaded. A manual update option is also available.

Content Filtering Technology Report www.westcoastlabs.com 13


Trend Micro™ IWSS
Operations and Features

Further to this, if a user


(or the administrator
themselves) believes
a URL to be incorrectly
classified by Trend,
a function exists that
allows the administrator
to contact Trend Labs
and request a review of
the classification. Such
interaction between
the user base and
Trend enables the
URL database to be
constantly maintained, and also to ensure that it is an accurate
reflection of the user base’s attitude to the web.

People responsible for paying for an organisation’s network


connectivity may also be pleased to note the provision of a
Quota system within IWSS. This allows the administrator to specify a
bandwidth limit, in MB, for the amount of Internet browsing allowed
for customizable groups of users. This allows users to browse the
Internet freely while providing a deterrent against the excessive
download of files.

IWSS also provides virus and spyware protection through the use of
Scan Policies. These policies allow the administrator to alter specific
options such as whether or not to encrypt quarantined items, as
well as standard options including the blocking of specific file types
and the scanning of compressed files. The administrator is also free
to designate the action to perform should a file be found to be virus
infected - such actions might include quarantine or remove.

Content Filtering Technology Report www.westcoastlabs.com 14


Trend Micro™ IWSS
Reports

Reports, which can


be easily generated
via the interface, are
detailed and cover a
wide range of areas.
Clicking on the Reports
menu option presents
the administrator with
three options, allowing
them either to generate
a realtime report, view
a scheduled report, or
to amend the various
reporting options.

When choosing to generate a realtime report, the administrator may


select either an individual technology, for example URL filtering, or
multiple technologies. Also available to the administrator is the choice
of the timeframe for which a report should be generated. These range
from the year of release to a theoretical endpoint of 2012 - providing
a potential, and impressive, seven years of statistics that may be
included in one report.

The resulting reports are very detailed, with the data contained
displayed in both numerical format as well as graphically, through the
use of various charts. Once generated, these reports can be exported
to a CSV file for backup or audit purposes. The reports are laid out in a
printer friendly fashion, including a print option on the page itself.

Content Filtering Technology Report www.westcoastlabs.com 15


Trend Micro™ IWSS
Reports

Scheduled Reports are


taken each day and
can be viewed either as
they are or as part of a
compilation report on a
weekly or monthly basis.

Reports may be
configured via the
customization tab. This
allows the administrator
to adjust the data that is
contained within each
report, specifically the
number of records that are to be displayed. For example, by default
each report displays the ten most common URLs to be blocked, this
may be altered to display any number of records (with the knock
on effect of increased memory usage). It is from here that the
administrator may also define how many monthly, daily, and weekly
reports should be stored.

Content Filtering Technology Report www.westcoastlabs.com 16


Trend Micro™ IWSS
Result

InterScan Web Security Suite from Trend Micro correctly


identified 100% of the URLs contained with the West
Coast Labs Test Suite. As such, IWSS is awarded the
Checkmark Premium Certification for URL Filtering.

www.check-mark.com

Content Filtering Technology Report www.westcoastlabs.com 17


Trend Micro™ IWSS
Conclusion

InterScan Web Security Suite is a highly customizable security solution


that performed consistently during testing, correctly classifying each
URL submitted as part of the test set. The flexibility afforded to the
administrator ensures that IWSS can be tailored to meet the demands
of today's businesses.

The provision of an industry established antivirus engine to accompany


the solid performance of the URL filtering mechanism further enhances
the level of security offered by IWSS.

The user experience, in part due to the common sense approach


of the menu system, is one of clarity and ease. By avoiding the
temptation of using an over developed, and overtly flash interface,
the administrator will find instant familiarity with the layout and thus
decrease the time needed to make the most of IWSS.

Content Filtering Technology Report www.westcoastlabs.com 18


Trend Micro™ IWSS
Security Features Buyers Guide

Trend Micro™ InterScan™ Web Security Suite protects corporate


networks against Web-based viruses, spyware, grayware, and
phishing, plus optional modules combat malicious mobile code and
manage employee Internet use.

url : http://us.trendmicro.com/us/products/enterprise/interscan-web-
security-suite/

Business Benefits... as stated by Trend


First line of defense
Stops threats at the enterprise perimeter— before they can infiltrate
the network

Integrated security
Enables a coordinated defense against viruses, spyware, grayware,
phishing, malicious mobile code, and unwanted content

Lower cost of ownership


Eliminates the need for multiple point products, minimizing the cost
and effort to deploy, manage, and maintain

Easy to manage
Enables centralized policy-based management, supports external
directory services, and offers multiple scanning and configuration
options—for greater ease-of-use

High performance
Scans and delivers Web pages with minimal system latency—for an
optimal Web-user experience and improved employee productivity

url : http://us.trendmicro.com/us/products/enterprise/interscan-web-
security-suite/

Content Filtering Technology Report www.westcoastlabs.com 19


Trend Micro™ IWSS
Security Features Buyers Guide

Technical Benefits... as stated by Trend

Blocks Web-based viruses


Trend Micro’s award-winning virus scan engine filters HTTP and FTP
traffic to block viruses, Trojans, and worms hidden in Web pages and
Web-based email.

Stops spyware and grayware at the enterprise perimeter


Improved anti-spyware technology detects and blocks spyware and
grayware before it infiltrates desktops and burdens system resources.

Protects against phishing attacks


It guards against identity theft and protects confidential company
information by blocking outbound data to known phishing-related
Web sites.

Detects and blocks malicious mobile code


The optional Applets and ActiveX Security module screens Web pages
for malicious mobile code by checking Java code and validating
signatures and certificates on ActiveX and Java applets.

Filters inappropriate Web content


The optional URL Filtering module enables companies to block Web
content unrelated to business in order to preserve bandwidth and
improve employee productivity.

Automates Damage Cleanup


When integrated with optional Trend Micro Damage Cleanup Services,
it cleans infected files and removes threats, including spyware that
attempts to “phone home” through the gateway.

url : http://us.trendmicro.com/us/products/enterprise/interscan-web-
security-suite/

Content Filtering Technology Report www.westcoastlabs.com 20


Trend Micro™ IWSS
Security Features Buyers Guide

Trend IWSS 2.5 for Windows... developments in the last 12 months


IWSS has been developed with an eye towards finding the right
balance between providing in-depth scanning of HTTP and FTP traffic
and offering sufficient throughput and performance to keep Internet
users productive. Trend’s legacy of developing highly accurate
threat detection technology provides the basis for the IWSS product
line. Enterprise-class policy management and reporting allow
administrators to effectively deploy the solution without disrupting key
business applications. The cross-platform and multi-mode deployment
support of IWSS also provides enterprises with the flexibility to route
HTTP and FTP traffic in the most efficient way possible to support their
applications.

The past 12 months of development for the IWSS solution has been
focused in two areas:
1. Application security – awareness and policy definition for traffic that
tunnels over port 80 masquerading as HTTP browser traffic. IM and
P2P traffic is a classic example. In addition, several enhancements to
the spyware engine and URL filtering categorization features have
been made to better serve the needs of large organizations.
2. Reducing latency – as the IWSS scanning engines are enhanced
to catch more malware, the latency introduced to the end-users’
browsing experience must be reduced. Breakthroughs in connection
management and streaming scanning technology have allowed
the IWSS product to continue to provide transparent web security for
enterprise users.

Content Filtering Technology Report www.westcoastlabs.com 21


Trend Micro™ IWSS
Security Features Buyers Guide

Additional Noteworthy Product Features

Comprehensive Web Security


• Protects corporate networks against Web-based attacks, including
viruses, Trojans, worms, spyware, grayware, and phishing
• Blocks malicious mobile code and unwanted Web content when
integrated with optional Applets and ActiveX Security and URL
Filtering modules
• Filters HTTP and FTP traffic with minimal impact on Web performance
• Extends Trend Micro™ Enterprise Protection Strategy to the Internet
gateway—for outbreak lifecycle management at the enterprise
perimeter

Anti-Spyware
• Blocks spyware and grayware at the gateway before it can infect
clients, harm the network, and burden system resources
• Gives granular control to block/allow subtypes of grayware,
including adware, dialers, joke programs, hacking and remote
access tools, password cracking applications, etc.
• Delivers spyware-specific activity logs and reports, including a threat
summary graph

Anti-Phishing
• Blocks transmission of outbound data to known phishing-related Web
sites in order to protect credit cards, bank accounts, user names,
passwords, etc.
• Complements the anti-phishing capabilities of traditional spam
filtering technology, which addresses inbound traffic only

URL Filtering–Optional Module


• Enables IT managers to restrict employee Internet use by category,

Content Filtering Technology Report www.westcoastlabs.com 22


Trend Micro™ IWSS
Security Features Buyers Guide

group or user, time of day, day of week, and bandwidth quotas


• Filters Web content through an ever-expanding database with
millions of URLs categorized to effectively identify and block
inappropriate Web sites
• Employs dynamic rating technology—in real-time as users browse—
to classify requested Web sites that are not already in the database

Applets and ActiveX Security–Optional Module


• Blocks malicious mobile code hidden in Web pages by checking
Java code and performing certificate and signature validation on
ActiveX and Java applets
• Protects against “zero day” attacks by analyzing ActiveX and Java
applets
• Provides additional protection against “drive-by” installation of
spyware
• Seamlessly integrates with the suite for greater protection against
mixed-threat attacks

Damage Cleanup Services–Optional Service


• Automates clean up and repair, removing viruses, worms, Trojans,
and spyware
• Automatically blocks spyware that attempts to “phone home”
through the gateway

Content Filtering Technology Report www.westcoastlabs.com 23


Trend Micro™ IWSS
Sample Acceptable Usage Policy

The following policy applies to all staff of Company XX (“the


Company”) and to those offered access to the Company resources.

Electronic media are of increasing importance to the Company,


both internally and externally. The following policy gives guidance for
appropriate usage.

E-mail

General Principles
In general, staff are expected to apply basic good judgement and
common sense in their use of e-mail.

You should bear in mind that e-mails are not private to you. The
Company has the right to monitor and/or record e-mails or electronic
documents that you create, send or receive:

•For security and network management reasons;


•To ensure compliance;
•Where necessary in order to carry out the business of the Company;
•To prevent or detect a crime.

All e-mail recorded messages remain the property of the Company.


Furthermore you should be aware that even when you delete a
message, a back-up copy is likely to be retained.

You should also remember that e-mails are admissible as evidence


in legal proceedings involving the Company. In addition, however
carefully the system is protected, hacking is always a possibility and
you should be wary of sending confidential information by e-mail. If in
any doubt, make sure you ask your manager.

Limited personal use of e-mail is, at the discretion of your manager,


acceptable. However, this must not interfere with your work or

Content Filtering Technology Report www.westcoastlabs.com 24


Trend Micro™ IWSS
Sample Acceptable Usage Policy

performance. Unreasonable personal use, including in particular the


use of the system for personal business activities or a high volume of
personal e-mails, will be considered a serious disciplinary offence.

Employees expressly shall not:


•Use e-mail for personal advertisements or participate in chain letters
•Send or solicit material that is thought to be obscene, abusive,
defamatory, sexually explicit, offensive, racist or sexist to the recipient
or any other individual or which is intended to annoy, harass or
intimidate another person. The soliciting of such e-mails will be
considered a serious disciplinary offence.
•Create e-mail congestion by sending trivial messages or
unnecessarily copying e-mails.
•Download, copy or transmit to third parties, the works of others
without their permission as this may infringe copyright.
•Download unlicensed copyrighted software.

The following are allowed:


•Internal regular reporting
•Sensible requests for information

As a rule of thumb, you must be as careful about sending an electronic


message as you would a letter on the Company’s headed paper. The
Company may be liable for what you do from the Company network
whether we know about it or not.

You are expected to protect the integrity, security and confidentiality


of your data and equipment. Abuse of the e-mail system will be dealt
with under the disciplinary procedure and serious breaches may result
in dismissal.

Content Filtering Technology Report www.westcoastlabs.com 25


Trend Micro™ IWSS
Sample Acceptable Usage Policy

Internet
General Principles:

Use of the Internet by Company employees is permitted and


encouraged where such use is suitable for business purposes and
supports the goals and objectives of the Company.

You should bear in mind that the websites visited by you may be
monitored and/or recorded:
•For security and network management reasons;
•To ensure compliance with this policy;
•Where necessary in order to carry out the business of the Company;
•To prevent or detect a crime.

The Internet is to be used in a manner that is consistent with the


Company’s standards of business conduct and as part of the normal
execution of an employee’s job responsibilities.
•Corporate e-mail accounts, Internet IDs and web pages should
not be used for anything other than corporate sanctioned
communications.
•Users may be subject to limitations on their use of such resources.
•The distribution of any information through the Internet, computer-
based services, e-mail, and messaging systems is subject to the
scrutiny of the Company. The Company reserves the right to
determine the suitability of this information.

Employees are expressly forbidden to:


•Download, transmit or have possession of any pornographic material.
•Transmit, download or store any material that is thought to be
obscene, abusive, defamatory, sexually explicit, offensive, racist
or sexist or which is intended to annoy, harass or intimidate another
person. Transmitting, downloading or storing such material will be
Content Filtering Technology Report www.westcoastlabs.com 26
Trend Micro™ IWSS
Sample Acceptable Usage Policy

considered a serious disciplinary offence.


•Download or install software from the Internet without prior approval
from the Company’s IT Purchasing department.
•Send or otherwise participate in chain letters.
•Transmit confidential or proprietary matters of the Company.
•Send customer/supplier related info over any public computer system
unless with proper agreement and encryption.
•Infringe copyright laws.
•Participating in “chat rooms”.
•Use the Company’s computer resources to break into another site or
to illegally obtain information from another site.

Infringement of these prohibitions will be dealt with under the


Company’s disciplinary procedures and serious breaches may result in
dismissal.

Limited personal use of the Internet is, at the discretion of your


manager, acceptable. However, this must not interfere with your work
or performance. Unreasonable personal use, including in particular
the use of the system for personal business activities or a high volume of
personal Internet use, will be considered a serious disciplinary offence.

Approved by the Directors, Company XX

Content Filtering Technology Report www.westcoastlabs.com 27


US SALES
T +1 925 833 6935

EUROPE SALES
T +44 2920 548 400

GLOBAL HEADQUARTERS
West Coast Labs
Unit 9 Oak Tree Court
Mulberry Drive
Cardiff Gate Business Park
Cardiff
CF23 8RS, UK

Você também pode gostar