Full Disclosure & Acceptable Use
Scope
This policy applies to anyone who connects to company-provided Wi-Fi or wired networks, including employees, contractors, and guests. It applies to company-owned devices and personally owned devices when they are connected to these networks.
Purpose
The company uses network security controls to help prevent unauthorized access, phishing, malware, data loss, and other threats; to maintain reliable service; and to support compliance with company policies and applicable laws.
What We Collect and Monitor
To operate and secure the network, the company may collect and review the following categories of information:
· Device and identity information (e.g., device name, MAC address, IP address, user/account identifier if authenticated).
· Connection information (e.g., date/time, duration, access point, VLAN/SSID, DHCP assignments).
· Network security metadata (e.g., DNS queries/domains requested, protocol/port usage, traffic volumes, firewall/IDS/IPS alerts).
· Security and compliance events (e.g., malware detections, policy violations, indicators of compromise, blocked requests).
Encrypted Traffic Inspection (SSL/TLS)
The company uses a firewall security gateway that may perform SSL/TLS inspection (also called HTTPS decryption). When enabled for a device/network segment, the gateway can decrypt and inspect encrypted traffic to detect threats and protect data, then re-encrypt traffic to the destination.
Important notes:
· SSL/TLS inspection typically requires the connecting device to trust a company-managed inspection certificate. It is commonly enabled on company-managed devices and may be limited or not enabled for guest devices.
· When SSL/TLS inspection is active, some content within encrypted sessions (e.g., URLs and data in transit) may be visible to security tools and authorized administrators.
· Inspection is used for security, troubleshooting, and policy enforcement – not for personal reasons.
Privacy and Access Controls
The company does not monitor network activity for personal reasons. Access to logs and inspection data is restricted to authorized personnel and approved service providers with a legitimate need (e.g., security operations, incident response, compliance, network administration). We apply least-privilege access, audit logging, and confidentiality obligations where appropriate.
No Expectation of Privacy
Because this network is company-provided, you should not expect privacy when using it. Network activity may be logged, monitored, and reviewed consistent with this policy and applicable law. If you do not consent to monitoring (including potential SSL/TLS inspection on applicable devices), do not use this network.
Guest Access
Guests are provided internet access for convenience. Guest access may be isolated from internal corporate systems and may be filtered or rate-limited to maintain security and performance. Guests must not use the network for unlawful activities or to access, probe, or disrupt company systems.
Acceptable Use
Users of the network must:
· Use the network responsibly and in a manner consistent with company policies and the law.
· Keep devices reasonably secure (e.g., updated OS/browser, enabled security features).
· Immediately report suspected phishing, malware, credential compromise, or other security incidents to [IT/Security contact].
The following are prohibited:
· Attempting to bypass security controls (e.g., content filtering, segmentation, authentication), or using anonymization/proxy methods to evade policy controls.
· Unauthorized access, scanning, probing, interception, or disruption of any system, user, or network.
· Distribution of malware, phishing, spam, or other harmful content.
· Using the network for illegal activities or to infringe intellectual property rights.
Investigations and Enforcement
The company may investigate suspected security incidents, policy violations, or unlawful activity. This may include reviewing relevant logs, alerts, and (where necessary) limited traffic content. Appropriate corrective action may be taken, up to and including revoking network access, disciplinary action (for employees), and/or referral to law enforcement when required.
Retention
Network logs and security telemetry are retained for a limited period consistent with business needs and applicable requirements. Standard retention period: [e.g., 30/90/180 days]. Longer retention may apply for active investigations, legal holds, or compliance obligations.
Questions
For questions about this disclosure or to report a security concern, contact our main office.
Acknowledgement
You acknowledge that you have read and understood the Wi-Fi Network Monitoring & Traffic Disclosure, including that network activity may be monitored and that SSL/TLS inspection may be used on applicable devices/networks for security purposes.