Terms & Conditions

Privacy Policy

Last Updated: 16th September 2024

This is the privacy policy (“Privacy Policy”) that governs how Recursion and our affiliated companies (“Recursion AI”, “we”, “our” or “us”), use Personal Data (defined below) that we collect, receive and store about individuals in connection with the use of our website: https://recursion.so/ and any other website that we operate (each, together with its subdomains, content and services, a “Website”).

YOUR ACCESS OF THE WEBSITE CONSTITUTES YOUR ACCEPTANCE OF THE PRIVACY POLICY SET FORTH BELOW. IF YOU DO NOT ACCEPT THIS PRIVACY POLICY, DO NOT USE THIS WEBSITE.

Introduction

Recursion is committed to respecting your online privacy and recognizes your need for appropriate protection and management of any information you share with us by using our Website. This Privacy Policy describes the overall privacy practices of Recursion regarding information we collect on our Website and through our other Internet advertising mediums, including but not limited to email, newsletters, and leave-behinds. This Privacy Policy does not apply to the practices of companies that Recursion does not own or control, or to people that Recursion does not employ.

Changes To This Policy

Recursion reserves the right to modify this Privacy Policy without notice and any modifications are effective when they are posted here. If you are accessing this Website as a representative of an organization, this Privacy Policy binds both you individually and the organization and references to “you” or “You” and “your” or “Your” shall be construed to apply to you individually and the organization

Information Collected By Recursion

Non-personally identifiable consumer information

Recursion collects various types of information from you to better meet your needs and to provide you with a more relevant user experience. Some of this information is collected automatically through cookies (see later in this policy for more information on cookies) or other Internet tracking technologies. The type of information your browser or Internet session may automatically provide us with can include the browser you are using, your Internet domain, the operating system on your computer, your IP address, the URL you visited just before coming to the Recursion Website, the pages of the Website you visited and the URL you visited upon leaving the Website. Recursion may also contract with reputable third-party advertising companies to serve ads on our behalf. These companies may also use cookies or other measures to collect your non-personally identifiable information.

Personally identifiable consumer information

Recursion collects information that you may choose to provide to us when requesting additional information from us. Some examples of personally identifiable data that you may provide to us include name, address, telephone number and email address. If you provide personally identifiable data to us, you may later elect to have your information deleted from our files, or kept from being used for purposes other than for the service requested, by following the opt-out procedures set forth below.

How Collected Information Is Used

The non-personally identifiable information that Recursion collects is used for marketing and sales efforts to better target advertisements and other content in an effort to create a more personally relevant experience. The information is also used to predict responses to advertisements, and to help determine which ads perform best and which content is most appropriate for different individuals and organizations. If you elect to provide Recursion with personally identifiable information, we may utilize such information for marketing purposes, and this use may result in follow-up communications from Recursion. In addition, that information may be combined with information collected from other sources to assist with targeting ads to your preferences and behaviors and for other Recursion sales and marketing efforts. We hold on to your information for as long as you have your Account, or as long as is needed to be able to provide the Services to you, or (in the case of any contact you may have with our support team) for as long as is necessary to provide support-related reporting and trend analysis only. If reasonably necessary or required to meet legal or regulatory requirements, resolve disputes, prevent fraud and abuse, or enforce our terms and conditions, we may also keep hold of some of your information as required by law, even after you have closed your account or it is no longer needed to provide the services to you.

Sharing Information With Third Parties

We may give your information to any member of our company which supports our processing of personal data under this policy or anyone of the following selected third parties:

⦁ Organizations that process your personal data on our behalf and in accordance with our instructions and applicable law. This includes organizations supporting the services we offer through the site, in particular organizations providing website and data hosting services, providing fulfillment services, distributing any communications we send, supporting or updating marketing lists, and facilitating feedback on our services. These organizations (which may include third party suppliers, agents or their subcontractors) will only use your information to the extent necessary to perform their support functions.

⦁ Analytics and search engine providers that assist us in the improvement and optimization of our site and are subject to the cookie section of this policy (this will not identify you as an individual).

⦁ Business partners who jointly with us provide services to you and with whom we have entered into agreements in relation to the processing of your personal data.

⦁ Payment processing providers who provide secure payment processing services. (Your payment card details are not shared with us by the provider.)

We will disclose your personal information to third parties:

⦁ In the event that we sell or buy any business or assets, in which case we will disclose your personal data to the prospective seller or buyer of such business or assets, subject to the terms of this Privacy Policy.

⦁ If Recursion or substantially all of its assets are acquired by a third party, in which case personal data held by it about its customers will be one of the transferred assets.

⦁ If we are under a duty to disclose or share your personal data in order to comply with any legal obligation, or in order to enforce or apply our terms of service, terms of use, and other agreements with you; or to protect the rights, property, or safety of Recursion, our customers, or others.

Location Of Personal Information

Recursion is located in the United States. Depending on the scope of your interactions with Recursion, your personal information may be stored in or accessed from multiple countries, including the United States. Whenever we transfer personal information to other jurisdictions, we will ensure that the information is transferred in accordance with this Privacy Notice and as permitted by applicable data protection laws.

Our Privacy Policy And Outside Links

This Privacy Policy only applies to the Recursion Website. Once you are outside of the Recursion Website, any information you submit is no longer in our control or governed by this Privacy Policy. You should be sure that you review the privacy policy of any website to which you link or redirect your browser, and you should not assume that any such website is operated by Recursion or governed by this Privacy Policy.

Security

Wherever your personally identifiable information may be held within Recursion or on its behalf, we intend to take reasonable and appropriate steps to protect the information you shared with us from access or disclosure not in compliance with this Privacy Policy. Please note that while Recursion will make every reasonable effort to protect your information, no transmission of data over the Internet is 100% secure. Recursion maintains physical, electronic, and procedural safeguards in connection with the collection, storage, and disclosure of personal information. We protect the security of your information during transmission to or from Recursion websites, applications, products, or services by using encryption protocols and software.

Opting Out

Non-personally identifiable consumer information – use of cookies and opting-out

The Recursion Website utilizes cookies to collect information about your Website activities and to recall the personal information you previously shared with us. Most browsers allow you to control cookies, including whether or not to accept them and how to remove them. You may set most browsers to notify you if you receive a cookie, or you may choose to block cookies with your browser. Blocking cookies may result in a lower quality experience for you while you are visiting the Recursion Website.

Personally identifiable consumer information – opting-out

You may choose whether or not to provide personally identifiable information to Recursion. If you choose to provide such information to Recursion, you have the right to tell us not to use such information in some or all of the ways described herein or to require that such information be deleted from our database. If you no longer wish to receive our newsletters, surveys or promotional communications via email, you may opt-out by following the instructions to unsubscribe at the bottom of any promotional communication. To have your personal information completely removed from our databases, simply contact us at [email protected] and provide the name of the service for which information was provided, your full name and email address so that we may identify you in the opt-out process. Once we receive your instruction, we will promptly take corrective action.

Access And Accuracy

To the extent that you do provide us with personally identifiable information, Recursion wishes to maintain the accuracy of this information. Where we collect personally identifiable information from you on the Website, our goal is to provide a means of contacting Recursion should you need to update or correct that information. If for any reason those means are unavailable or inaccessible, you may send updates and corrections about your personally identifiable information to [email protected] and we will make reasonable efforts to incorporate the changes in the information that we hold as soon as practicable.

GDPR Information For EU Customers

Personal information: The personal information we collect may be considered Personal Data under the General Data Protection Regulation.

Data Transfer: We provide our Services from the US. That means that we may transfer your data from the EU to the US. Because the European Commission has not provided a decision of adequacy for the US, we protect your privacy and your rights through the use of the European Commission’s standard data protection clauses.

We’ll take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this Privacy Policy and no transfer of your personal information will take place to an organization or a country unless there are adequate controls in place including the security of your data and other personal information.

Your rights

If you’re located in the EU, you have the following rights relating to your personal information:

⦁ The right to be informed about how your personal information is being used

⦁ The right to access the personal information we hold about you

⦁ The right to request the correction of inaccurate personal information we hold about you

⦁ The right to request that we delete your data, or stop processing it or collecting it, in some circumstances

⦁ The right to stop direct marketing messages, which you can do through My Account, and to withdraw consent for other consent-based processing at any time

⦁ The right to request that we transfer or port elements of your data either to you or another service provider

⦁ The right to complain to your data protection regulator — in the UK, the Information Commissioner’s Office

California Consumer Privacy Act

Categories of personal information collected. The personal information that we may collect, or may have collected from consumers in the preceding twelve months, fall into the following categories established by the California Consumer Privacy Act, depending on how you engage with Recursion’s Offerings:

⦁ Identifiers, such as your name, alias, address, phone numbers, or IP address;

⦁ personal information as described in subdivision (e) of Section 1798.80 of the California Civil Code, such as a credit card number;

⦁ characteristics of protected classifications under California or US federal law, such as age or gender, for example, if we conduct user surveys or analysis;

⦁ commercial information, such as purchase activity;

⦁ internet or other electronic network activity information, including content interaction information, such as content downloads, streams, and playback details;

⦁ audio, visual, electronic or other similar information, including when you communicate with us by phone or otherwise;

⦁ professional or employment-related information, for example, data you may provide about your business;

⦁ inference data, such as information about your preferences

For more information about the personal information we collect, see the above section on information collected by Recursion.

Categories of personal information disclosed for a business purpose. The personal information that we may have disclosed about consumers for a business purpose in the preceding twelve months fall into the following categories established by the California Consumer Privacy Act, depending on how you engage with Recursion’s Offerings:

⦁ Identifiers, such as your name, email, address, or phone numbers, for example, if we use a third party to facilitate customer contracts;

⦁ personal information as described in subdivision (e) of Section 1798.80 of the California Civil Code, such as a credit card number, for example, if we use a third-party payment processor;

⦁ your age, gender, or other protected classifications under California or US federal law, for example, if we conduct user surveys or analysis using a third-party service provider;

⦁ commercial information, such as the details of a product or service you purchased if a third-party service provider is assisting to provide that product or service to you;

⦁ Internet or other electronic network activity information, such as if we use a third-party service provider to help us gather reports for analyzing the health of our services;

⦁ audio, visual, electronic or other similar information, for example, if a third-party service provider reviews recordings of customer support phone calls for quality assurance purposes;

For more information about the personal information, we may disclose to third parties for a business purpose, please see the relevant sections in this document above.

Your Rights. You may have the right under the California Consumer Privacy Act to request information about the collection of your personal information by us, or access to or deletion of your personal information. If you wish to do any of these things, please contact us at [email protected]. Depending on your data choices, certain services may be limited or unavailable.

No sale of personal information. In the preceding twelve months, we have not sold any personal information of consumers, as those terms are defined under the California Consumer Privacy Act.

No Discrimination. We will not discriminate against any consumer for exercising their rights under the California Consumer Privacy Act.

Links To Other Sites

The Services may contain links to other sites that are not operated by us. If you click on a third-party link, you will be directed to that third party’s site. We strongly advise you to review the Privacy Policy of every site you visit, as we have no control over and assume no responsibility for the content, privacy policies, or practices of any third-party sites or services.

Children’s Privacy

Our site and product offerings are not intended for children under the age of 18. Accordingly, we do not intend to collect Personal Data from anyone we know to be under 18 years of age.

Website Analytics

Recursion may use website analytics tools to collect information about the use of our Website. These tools collect information such as how often users visit our Website and what other websites were viewed prior to and after visiting our Website.

Cookies

We use cookies, pixels, and other similar technologies (collectively, “cookies”) to recognize your browser or device, learn more about your interests, provide you with essential features and services, and for additional purposes, including:

⦁ Recognizing you when you sign in to use our offerings. This allows us to provide you with recommendations, display personalized content, and provide other customized features and services.

⦁ Keeping track of your specified preferences such as your language and configuration preferences.

⦁ Conducting research and diagnostics to improve our offerings.

⦁ Preventing fraudulent activity.

⦁ Improving security.

⦁ Delivering content, including ads, relevant to your interests on Recursion sites and third-party sites (see the Interest-Based Ads notice for how we use cookies in serving interest-based ads).

⦁ Reporting. This allows us to measure and analyze the performance of our offerings.

Recursion cookies allow you to take advantage of some essential Recursion features. For instance, if you block or otherwise reject our cookies, you might not be able to use certain offerings that require you to sign in, or you might have to manually adjust some preferences or language settings every time you visit Recursion sites.

Approved third parties may also set cookies when you interact with our offerings. Third parties include search engines, providers of measurement and analytics services, social media networks, and advertising companies. Third parties use cookies in the process of delivering content, including ads relevant to your interests, to measure the effectiveness of their ads, and to perform services on behalf of Recursion.

Your Contents

By using this Website, you consent to the terms of our Privacy Policy and to Recursion’s processing of personally identifiable information for the purposes given above. Should this Privacy Policy change, we intend to take reasonable steps to ensure that these changes are brought to your attention by amending this Privacy Policy.

Commitment And Contacting Us

If you have any comments or questions regarding our Privacy Policy, please contact us at [email protected]. While we cannot guarantee privacy perfection, we will address any issue to the best of our abilities as soon as practicable after you bring it to our attention. For more information, or if you have questions or concerns regarding Recursion’s Privacy Policy, you may email us at [email protected] or you can send correspondence to the following address:

Recursion

1111B S Governors Ave STE 3806 Dover,

Delaware 19904, U.S.A.

Information Security Policy (AUP)

Policy Owner: Derek Lowry

Effective Date: Jun 1st, 2024

Overview

This Information Security Policy is intended to protect Vero Global Inc T/A Recursion's employees, partners and the company from illegal or damaging actions by individuals, either knowingly or unknowingly.

Internet/Intranet/Extranet-related systems, including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, web browsing, and file transfers, are the property of Vero Global Inc T/A Recursion. These systems are to be used for business purposes in serving the interests of the company, and of our clients and customers in the course of normal operations.

Effective security is a team effort involving the participation and support of every Vero Global Inc T/A Recursion employee or contractor who deals with information and/or information systems. It is the responsibility of every team member to read and understand this policy, and to conduct their activities accordingly

Purpose

The purpose of this policy is to communicate our information security policies and outline the acceptable use and protection of Vero Global Inc T/A Recursion's information and assets. These rules are in place to protect customers, employees, and Vero Global Inc T/A Recursion. Inappropriate use exposes Vero Global Inc T/A Recursion to risks including virus attacks, compromise of network systems and services, and legal and compliance issues.

The Vero Global Inc T/A Recursion "Information Security Policy" is comprised of this policy and all Vero Global Inc T/A Recursion policies referenced and/or linked within this document.

Scope

This policy applies to the use of information, electronic and computing devices, and network resources to conduct Vero Global Inc T/A Recursion business or interact with internal networks and business systems, whether owned or leased by Vero Global Inc T/A Recursion, the employee, or a third party. All employees, contractors, consultants, temporary, and other workers at Vero Global Inc T/A Recursion and its subsidiaries are responsible for exercising good judgment regarding appropriate use of information, electronic devices, and network resources in accordance with Vero Global Inc T/A Recursion policies and standards, and local laws and regulations

This policy applies to employees, contractors, consultants, temporaries, and other workers at Vero Global Inc T/A Recursion, including all personnel affiliated with third parties. This policy applies to all Vero Global Inc T/A Recursion controlled company and customer data as well as all equipment, systems, networks and software owned or leased by Vero Global Inc T/A Recursion.

Security incident reporting

All users are required to report known or suspected security events or incidents, including policy violations and observed security weaknesses. Incidents shall be reported immediately or as soon as possible by sending email to COO.

In your report, please describe the incident or observation along with any relevant details.

Mobile device policy

All end-user devices (e.g., mobile phones, tablets, laptops, desktops) must comply with this policy. Employees must use extreme caution when opening email attachments received from unknown senders, which may contain malware.

System level and user level passwords must comply with the Access Control Policy. Providing access to another individual, either deliberately or through failure to secure a device is prohibited.

All end-user, personal (BYOD) or company owned devices used to access Vero Global Inc T/A Recursion information systems (i.e. email) must adhere to the following rules and requirements:

⦁ Devices must be locked with a password (or equivalent control such as biometric) protected screensaver or screen lock after 5 minutes of non-use

⦁ Devices must be locked whenever left unattended

⦁ Users must report any suspected misuse or theft of a mobile device immediately to the COO

⦁ Confidential information must not be stored on mobile devices or USB drives (this does not apply to business contact information, e.g., names, phone numbers, and email addresses)

⦁ Any mobile device used to access company resources (such as file shares and email) must not be shared with any other person

⦁ Upon termination users agree to return all company owned devices and delete all company information and accounts from any personal devices

Clear screen clear desk policy

Users shall not leave confidential materials unsecured on their desk or workspace, and will ensure that screens are locked when not in use.

Remote working and access policy

Remote working refers to any situation where organizational personnel operate from locations outside the office. This includes teleworking, telecommuting, flexible workplace, virtual work environments, and remote maintenance. Laptops and other computer resources that are used to access the Vero Global Inc T/A Recursion network must conform to the security requirements outlined in Vero Global Inc T/A Recursion's Information Security Policies and adhere to the following standards:

⦁ Company rules shall be followed while working remote including clear desk protocols, printing, disposal of assets, and information security event reporting to prevent mishandling or accidental exposure of sensitive information.

⦁ To ensure mobile devices do not connect a compromised device to the company network, Antivirus policies require the use and enforcement of client-side antivirus software

⦁ Antivirus software must be configured to detect and prevent or quarantine malicious software, perform periodic system scans, and have automatic updates enabled

⦁ When working from a home network, ensure that the default wifi settings are changed, such as name, password and admin access

⦁ Users must not connect to any outside network without a secure, up-to-date software firewall configured on the mobile computer

⦁ Users must not connect to any outside network without a secure, up-to-date software firewall configured on the mobile computer

⦁ Users are prohibited from changing or disabling any organizational security controls such as personal firewalls, antivirus software on systems used to access Vero Global Inc T/A Recursion resources

⦁ Use of remote access software and/or services (e.g., VPN client) is allowable as long as it is provided by the company and configured for multifactor authentication (MFA)

⦁ Unauthorized remote access technologies may not be used or installed on any Vero Global Inc T/A Recursion system

⦁ Users shall use a VPN when transmitting confidential information on public Wi-Fi

⦁ If you access from a public computer (e.g., from a business center, hotel, etc.), log out of the session and don't save anything. Don't check "remember me", collect all printed materials and do not download files to a non-Vero Global Inc T/A Recursion controlled system

Acceptable use policy

Vero Global Inc T/A Recursion proprietary and customer information stored on electronic and computing devices, whether owned or leased by Vero Global Inc T/A Recursion, the employee or a third party, remains the sole property of Vero Global Inc T/A Recursion for the purposes of this policy. Employees and contractors must ensure through legal or technical means that proprietary information is protected in accordance with the Data Management Policy. The use of Google Drive for business file storage is required for users of laptops or company issued devices. Storing important documents on the file share is how you "backup" your laptop.

You have a responsibility to promptly report the theft, loss, or unauthorized disclosure of Vero Global Inc T/A Recursion proprietary information or equipment. You may access, use or share Vero Global Inc T/A Recursion proprietary information only to the extent it is authorized and necessary to fulfill your assigned job duties. Employees are responsible for exercising good judgment regarding the reasonableness of personal use of company-provided devices.

For security and network maintenance purposes, authorized individuals within Vero Global Inc T/A Recursion may monitor equipment, systems and network traffic at any time.

Vero Global Inc T/A Recursion reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy

Unacceptable use

The following activities are, in general, prohibited. Employees may be exempted from these restrictions during the course of their legitimate job responsibilities with properly documented Management approval. Under no circumstances is an employee of Vero Global Inc T/A Recursion authorized to engage in any activity that is illegal under local, state, federal or international law while utilizing Vero Global Inc T/A Recursion-owned resources or while representing Vero Global Inc T/A Recursion in any capacity. The list below is not exhaustive, but attempts to provide a framework for activities which fall into the category of unacceptable use.

The following activities are strictly prohibited, with no exceptions:

1. Violations of the rights of any person or company protected by copyright, trade secret, patent, or other intellectual property, or similar laws or regulations, including, but not limited to, the installation or distribution of "pirated" or other software products that are not appropriately licensed for use by Vero Global Inc T/A Recursion

2. Unauthorized copying of copyrighted material including, but not limited to, digitization and distribution of photographs from magazines, books, or other copyrighted sources, copyrighted music, and the installation of any copyrighted software for which Vero Global Inc T/A Recursion or the end user does not have an active license

3. Accessing data, a server, or an account for any purpose other than conducting Vero Global Inc T/A Recursion business, even if you have authorized access, is prohibited

4. Exporting software, technical information, encryption software, or technology, in violation of international or regional export control laws, is illegal. The appropriate management shall be consulted prior to export of any material that is in question

5. Introduction of malicious programs into the network or systems (e.g., viruses, worms, Trojan horses, email bombs, etc.)

6. Revealing your account password to others or allowing use of your account by others. This includes family and other household members when work is being done at home

7. Using a Vero Global Inc T/A Recursion computing asset to actively engage in procuring or transmitting material that is in violation of sexual harassment or hostile workplace laws

8. Making fraudulent offers of products, items, or services originating from any Vero Global Inc T/A Recursion account

9. Making statements about warranty, expressly or implied, unless it is a part of normal job duties

10. Effecting security breaches or disruptions of network communication. Security breaches include, but are not limited to, accessing data of which the employee is not an intended recipient, or logging into a server or account that the employee is not expressly authorized to access, unless these duties are within the scope of regular duties. For purposes of this section, "disruption" includes, but is not limited to, network sniffing, pinged floods, packet spoofing, denial of service, and forged routing information for malicious purposes

11. Port scanning or security scanning is expressly prohibited unless prior notification to the Vero Global Inc T/A Recursion engineering team is made

12. Executing any form of network monitoring which will intercept data not intended for the employee's host, unless this activity is a part of the employee's normal job/duty

13. Circumventing user authentication or security of any host, network, or account

14. Introducing honeypots, honeynets, or similar technology on the Vero Global Inc T/A Recursion network

15. Interfering with or denying service to any user other than the employee's host (for example, denial of service attack)

16. Using any program/script/command, or sending messages of any kind, with the intent to interfere with, or disable, a user's session, via any means

17. Providing information about, or lists of: Vero Global Inc T/A Recursion employees, contractors, partners, or customers to parties outside Vero Global Inc T/A Recursion without authorization

Email and communication activities

When using company resources to access and use the Internet, users must realize they represent the company and act accordingly.

The following activities are strictly prohibited, with no exceptions:

1. Sending unsolicited email messages, including the sending of "junk mail", or other advertising material to individuals who did not specifically request such material (email spam)

2. Any form of harassment via email, telephone, or texting, whether through language, frequency, or size of messages

3. Unauthorized use, or forging, of email header information

4. Solicitation of email for any other email address, other than that of the poster's account, with the intent to harass or to collect replies

5. Creating or forwarding "chain letters", "Ponzi", or other "pyramid" schemes of any type

6. Use of unsolicited email originating from within Vero Global Inc T/A Recursion networks or other service providers on behalf of, or to advertise, any service hosted by Vero Global Inc T/A Recursion or connected via Vero Global Inc T/A Recursion's network

Additional policies and procedures incorporated by reference

Policy Purpose
Access Control Policy To limit access to information and information processing systems, networks, and facilities to authorized parties in accordance with business objectives.
Asset Management Policy To identify organizational assets and define appropriate protection responsibilities.
Business Continuity & Disaster Recovery Plan To prepare Vero Global Inc T/A Recursion in the event of extended service outages caused by factors beyond our control (e.g., natural disasters, man-made events), and to restore services to the widest extent possible in a minimum time frame.
Cryptography Policy To ensure proper and effective use of cryptography to protect the confidentiality, authenticity, and/or integrity of information.
Data Management Policy To ensure that information is classified and protected in accordance with its importance to the organization.
Human Resources Policy To ensure that employees and contractors meet security requirements, understand their responsibilities, and are suitable for their roles.
Incident Response Plan Policy and procedures for suspected or confirmed information security incidents.
Operations Security Policy To ensure the correct and secure operation of information processing systems and facilities.
Physical Security Policy To prevent unauthorized physical access or damage to the organization’s information and information processing facilities.
Risk Management Policy To define the process for assessing and managing Vero Global Inc T/A Recursion's information security risks to achieve the company’s business and information security objectives.
Secure Development Policy To ensure that information security is designed and implemented within the development lifecycle for applications and information systems.

Policy compliance

The organization will measure and verify compliance to this policy through various methods, including but not limited to ongoing monitoring, and both internal and external audits.

Exceptions

Requests for an exception to this policy must be submitted to the COO for approval.

Violations & enforcement

Any known violations of this policy should be reported to the COO. Violations of this policy can result in immediate withdrawal or suspension of system and network privileges and/or disciplinary action in accordance with company procedures up to and including termination of employment.

Version history
Version Date Description Author Approver
4.0 Sep 4, 2024 Version 4.0 Derek Lowry Derek Lowry
3.0 Aug 28, 2024 Version 3.0 Derek Lowry Derek Lowry
2.0 Aug 27, 2024 Version 2.0 Derek Lowry Derek Lowry
1.0 Aug 26, 2024 Version 1.0 Derek Lowry Derek Lowry