How Can We Help?
-
Code of Conduct
-
Core Values & Principles
-
Learning & Development
-
Staff Rules Book
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
Onboarding & Induction
-
- Articles coming soon
-
-
HR Internal Procedures
-
- Articles coming soon
-
-
FAQs
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
Analytics
-
Popular questions
-
Purchase & Refund
Internet use / IT code of conduct
5.4 Internet use / IT code of conduct
As a general rule, all IT related resources and facilities are provided only for internal use and/or business-related matters, not for personal use. IT facilities which have been provided to employees should never be used for personal gain or profit, should not be misused during work time, and remain the property of LCPL and/or Lotte Group. Disclosure or dissemination of confidential or proprietary information regarding LCPL and/or Lotte Group, its products, or its customers outside the official communication structures is strictly prohibited.
IT related resources and facilities should not be used in any way that is unethical or illegal, or that could embarrass, defame, misrepresent, or convey an unjust or unfavorable impression of LCPL and/or Lotte Group or its business affairs, employees, suppliers, customers, competitors, or stakeholders. Unauthorized access to information and information systems is prohibited; access must be authorized by the owners of the information and in line with the user’s job description.
Information systems can be secured by personal passwords and/or additional authentication means like hardware tokens; users must use these in a responsible way, keeping them personal and securing them against misuse. Any installation, change, removal, or personal use of software provided by LCPL or Lotte Group or available on LCPL and/or Lotte Group Information Systems must be authorized and managed by the IT Department.
In order to prevent theft, loss or unauthorized use of information and systems, a user has to take measures to ensure the physical security of hardware provided such as laptops, phones, tokens, USB sticks, etc. To protect the availability of company data, users have to secure relevant business information in a timely manner, by making back-ups or storing data on network drives. Information Security related incidents or violation of Information Security principles must be reported to the Head of IT or Information Security contact. Possible evidence should not be tampered with. Every employee of LCPL is required to be familiar with and to comply with the Information Security rules and procedures.
LCPL reserves the right to review the activities performed by the user using company provided IT facilities. In such cases, the Chief Executive will be asked for authorization and local law will be observed at all times.