1 SCOPE
The internal regulation modifies permissions employees of the company to approve and sign documents within the activities of the company and the rules by which the company’s employees act.
2.1 SIGNATURE REGULATIONS IN CONTACT WITH EXTERNAL LEGAL ENTITIES
Signing for the company:
Signing on behalf of the company is going, so that the business the Company shall affix his signature Chief Executive Officer. The exact formulation is given in the Certificate of Incorporation. In the following matters they are authorized to sign for the company as well as other employees or collaborators.
Contract with clients:
Chief Executive Officer.
Instructions clients:
Chief Executive Officer.
Front office worker.
Treaty in the ordinary course of trade and security in the operation of the company:
Chief Executive Officer.
Employment contracts:
Chief Executive Officer.
Bank Transactions:
Executive or employees of the Company in accordance with specimen signatures in the bank.
Income invoice:
Executive, manager or accountant on the basis of internal accounting documents, ie. The guidelines accounting department to issue revenue invoices.
Ordinary letter intercourse:
All statutory representatives and employees in the scope of their job description.
Singing and acting with power of attorney:
Signing on behalf of the company and negotiations can be carried out also by the agent under a power of attorney signed by the executive of the company.
2.2 INTERNAL REGULATIONS OF SIGNATURE
Signatures and initialed:
All further specified internal documents must be signed, initialled or signed electronically secure electronic signature by an officer, whose activities are covered by the document in question. For the control and enforcement of this rule corresponds to the financial controller.
Accounting:
• Revenue and expense documents
• Stocks of securities and cash
• Bank statements
• Complaints
Front office:
• Revenue and expense documents (Treasury)
• Supporting documents for the transaction.
• Complaints
Back office:
• internal accounting documents – instructions for performing transactions
• internal accounting documents – instructions accountant’s production department to issue revenue invoices
• The internal accounting documents for the registration of individual transactions
• Complaints
Financial Controller:
• Complaints
2.3 ACCESS RULES
Use of Information System:
All electronic systems companies can only be accessed after identifying the name and password of an authorized person. Authorised Person undertakes to keep their passwords secret and not disclose it to third parties. Before leaving the workplace is authorized employee is obliged to secure their workplace to avoid unauthorized access to data and unauthorized manipulation.
Information Systems
In the company uses the following information systems:
• accounting system;
• processing system.
Authorization for access to the various systems
the accounting and processing system are authorized to enter:
• accounting;
• back-office personnel;
• Financial Controller;
• Chief Executive Officer;
• the manager of information systems.
The right to access individual systems for specific employees of the company are set out in the Annex to this internal regulation.
2.4 MANDATORY RULES FOR USING A PC LAN
Data Protection:
The employee is responsible for the security of entrusted PC (especially upon termination or interruption of work) against unauthorized access and the possibility of theft and misuse of data. It is therefore obliged, in collaboration with the IT administrator to secure the PC at least six-character passwords, namely:
• within a domain;
• on the screen saver operating system;
• to all business and economic applications.
The employee is required to maximize the confidentiality of the password and performs regular updates. Each employee has their own unique password and is not permitted to use passwords of other users. Update passwords regularly performs employee annually. In the case of disclosure, however, immediately.
The employee also performs regular checks of data relevant antivirus program and any problems immediately consult the IT manager. Regular monitoring of the antivirus program means checking each time gaining any software from other sources, or at least once a week. It makes sure that his computer always resident running appropriate antivirus program installed on your IT administrator.
The employee is allowed to make any copies of licensed software on company property, information databases, and other data and provide it to third parties.
Access to local PC
The data on your PC sole responsibility of the user PC. Backup of data is done by the users themselves, on the basis of their own needs.
The employee is not entitled, in particular:
• Install and use the software unless it is approved by the IT administrator;
• To carry out any modification of PC hardware;
• Use programs that are not related to his workload during working hours (especially gaming).
Access to LANs
The employee has created access privileges to individual shared data network, business and economic applications and other information resources, commensurate with the nature of his work. Furthermore, the so-called developed. Home directory, for its own data files, based on the relevant network volume, while the part that is precisely defined by the IT administrator, IT manager is centrally regularly backed up and archived. This space is limited capacity.
The employee has no right to interfere in any way to run servers, network rights to perform the installation of software to servers and their respective volumes. These activities are reserved for IT administrators.
Electronic Mail
An employee is assigned a mailbox, allowing it to communicate within the company, entities incorporated in the parent post office and within the Internet. The contents of the inbox archive are also deleted mail (without attached files) and in the last six months.
The size of the mailbox is limited in front and in excess of its size, the employee gets a warning and was prevented from sending, until the archive, or delete messages and reducing the size of the mailbox.
Internet
The employee has ensured access to the Internet, but the observance of safety data protection.