To prevent unauthorized access, use, control, disclosure, destruction, alteration, or other infringements upon core information systems and data, and to ensure their confidentiality, integrity, and availability, the following policy is established for all employees to follow: