Impressive Publishing operates http://www.formsboss.com. This page informs you of our policies regarding the collection, use and disclosure of
Personal Information we receive from users of the Site.
We use your Personal Information only for providing and improving the Site. By using the Site, you
agree to the collection and use of information in accordance with this policy.
Information Collection And Use
While using our Site, we may ask you to provide us with certain personally identifiable information
that can be used to contact or identify you. Personally identifiable information may include, but is not
limited to your name ("Personal Information").
Like many site operators, we collect information that your browser sends whenever you visit our Site
This Log Data may include information such as your computer's Internet Protocol ("IP") address,
browser type, browser version, the pages of our Site that you visit, the time and date of your visit,
the time spent on those pages and other statistics.
In addition, we may use third party services such as Google Analytics that collect, monitor and
The Log Data section is for businesses that use analytics or tracking services in websites or
We may use your Personal Information to contact you with newsletters, marketing or promotional
materials and other information that ...
The Communications section is for businesses that may contact users via email (email
Cookies are files with small amount of data, which may include an anonymous unique identifier.
Cookies are sent to your browser from a web site and stored on your computer's hard drive.
Like many sites, we use "cookies" to collect information. You can instruct your browser to refuse all
cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may
not be able to use some portions of our Site.
The security of your Personal Information is important to us, but remember that no method of
transmission over the Internet, or method of electronic storage, is 100% secure. While we strive to
use commercially acceptable means to protect your Personal Information, we cannot guarantee its
changes in its provisions in the future, which will be in effect immediately after being posted on this
address you have provided us, or by placing a prominent notice on our website.
Data Security Policy
This Acceptable Use Policy (AUP) for IT Systems is designed to protect Impressive Publishing, our employees, customers and other partners from harm caused by the misuse of our IT systems and our data. Misuse includes both deliberate and inadvertent actions.
The repercussions of misuse of our systems can be severe. Potential damage includes, but is not limited to, malware infection (e.g. computer viruses), legal and financial penalties for data leakage, and lost productivity resulting from network downtime.
Everyone who works at Impressive Publishing is responsible for the security of our IT systems and the data on them. As such, all employees must ensure they adhere to the guidelines in this policy at all times. Should any employee be unclear on the policy or how it impacts their role they should speak to their manager or IT security officer.
"Users" are everyone who has access to any of Impressive Publishing's IT systems. This includes permanent employees and also temporary employees, contractors, agencies, consultants, suppliers, customers and business partners.
"Systems" means all IT equipment that connects to the corporate network or access corporate applications. This includes, but is not limited to, desktop computers, laptops, smartphones, tablets, printers, data and voice networks, networked devices, software, electronically-stored data, portable data storage devices, third party networking services, telephone handsets, video conferencing systems, and all other similar items commonly understood to be covered by this term.
This is a universal policy that applies to all Users and all Systems. For some Users and/or some Systems a more specific policy exists: in such cases the more specific policy has precedence in areas where they conflict, but otherwise both policies apply on all other points.
This policy covers only internal use of Impressive Publishing's systems, and does not cover use of our products or services by customers or other third parties.
Some aspects of this policy affect areas governed by local legislation in certain countries (e.g., employee privacy laws): in such cases the need for local legal compliance has clear precedence over this policy within the bounds of that jurisdiction. In such cases local teams should develop and issue users with a clarification of how the policy applies locally.
Staff members at Impressive Publishing who monitor and enforce compliance with this policy are responsible for ensuring that they remain compliant with relevant local legislation at all times.
4. Use of IT Systems
All data stored on Impressive Publishing's systems is the property of Impressive Publishing. Users should be aware that the company cannot guarantee the confidentiality of information stored on any Impressive Publishing's system except where required to do so by local laws.
Impressive Publishing's systems exist to support and enable the business. A small amount of personal use is, in most cases, allowed. However it must not be in any way detrimental to users own or their colleagues productivity and nor should it result in any direct costs being borne by Impressive Publishing other than for trivial amounts (e.g., an occasional short telephone call).
Impressive Publishing trusts employees to be fair and sensible when judging what constitutes an acceptable level of personal use of the company's IT systems. If employees are uncertain they should consult their manager.
Any information that is particularly sensitive or vulnerable must be encrypted and/or securely stored so that unauthorised access is prevented (or at least made extremely difficult). However this must be done in a way that does not prevent or risk preventing legitimate access by all properly-authorized parties.
Impressive Publishing can monitor the use of its IT systems and the data on it at any time. This may include (except where precluded by local privacy laws) examination of the content stored within the email and data files of any user, and examination of the access history of any users.
Impressive Publishing reserves the right to regularly audit networks and systems to ensure compliance with this policy.
5. Data Security
If data on Impressive Publishing's systems is classified as confidential this should be clearly indicated within the data and/or the user interface of the system used to access it. Users must take all necessary steps to prevent unauthorized access to confidential information.
Users are expected to exercise reasonable personal judgement when deciding which information is confidential.
Users must not send, upload, remove on portable media or otherwise transfer to a non-Impressive Publishing system any information that is designated as confidential, or that they should reasonably regard as being confidential to Impressive Publishing, except where explicitly authorized to do so in the performance of their regular duties.
Users must keep passwords secure and not allow others to access their accounts. Users must ensure all passwords comply with Impressive Publishing's safe password policy.
Users who are supplied with computer equipment by Impressive Publishing are responsible for the safety and care of that equipment, and the security of software and data stored it and on other Impressive Publishing's systems that they can access remotely using it.
Because information on portable devices, such as laptops, tablets and smartphones, is especially vulnerable, special care should be exercised with these devices: sensitive information should be stored in encrypted folders only. Users will be held responsible for the consequences of theft of or disclosure of information on portable systems entrusted to their care if they have not taken reasonable precautions to secure it.
All workstations (desktops and laptops) should be secured with a lock-on-idle policy active after at most 10 minutes of inactivity. In addition, the screen and keyboard should be manually locked by the responsible user whenever leaving the machine unattended.
Users who have been charged with the management of those systems are responsible for ensuring that they are at all times properly protected against known threats and vulnerabilities as far as is reasonably practicable and compatible with the designated purpose of those systems.
Users must at all times guard against the risk of malware (e.g., viruses, spyware, Trojan horses, rootkits, worms, backdoors) being imported into Impressive Publishing's systems by whatever means and must report any actual or suspected malware infection immediately.
6. Unacceptable Use
All employees should use their own judgment regarding what is unacceptable use of Impressive Publishing's systems. The activities below are provided as examples of unacceptable use, however it is not exhaustive. Should an employee need to contravene these guidelines in order to perform their role, they should consult with and obtain approval from their manager before proceeding.
* All illegal activities. These include theft, computer hacking, malware distribution, contravening copyrights and patents, and using illegal or unlicensed software or services. These also include activities that contravene data protection regulations.
* All activities detrimental to the success of Impressive Publishing. These include sharing sensitive information outside the company, such as research and development information and customer lists, as well as defamation of the company.
* All activities for personal benefit only that have a negative impact on the day-to-day functioning of the business. These include activities that slow down the computer network (e.g., streaming video, playing networked video games).
* All activities that are inappropriate for Impressive Publishing to be associated with and/or are detrimental to the company's reputation. This includes pornography, gambling, inciting hate, bullying and harassment.
* Circumventing the IT security systems and protocols which Impressive Publishing has put in place.
Impressive Publishing will not tolerate any misuse of its systems and will discipline anyone found to have contravened the policy, including not exercising reasonable judgment regarding acceptable use. While each situation will be judged on a case-by-case basis, employees should be aware that consequences may include the termination of their employment.
Use of any of Impressive Publishing's resources for any illegal activity will usually be grounds for summary dismissal, and Impressive Publishing will not hesitate to cooperate with any criminal investigation and prosecution that may result from such activity.