hil-3r
hil-3r

Welcome to

Hindalco Business Application Portal


ACCEPTABLE USE POLICY AND USER AGREEMENT.

UNAUTHORIZED ACCESS IS PROHIBITED.

This system is the property of Hindalco Industries Limited (Company) and is provided only for the Company’s authorized and legitimate use. The user shall not use this system for any purpose but to carry out the official duties which are in the user’s course of employment. By accessing and using this system, the user confirms that the user shall comply with the then-current requirements of the Acceptable Use Policy and the Information Security Policy Manual that are available on Onstream. The user is strictly prohibited from conducting any activity, which could be a violation of any third party rights or in breach of any copyright or other intellectual property rights, any defamatory communication or any action which would be in violation of the Information Technology Act, 2000 and the rules framed thereunder or any other applicable law. All information assets and information thereon, including sensitive personal data as defined in the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 obtained in line with the applicable law shall be under the sole possession and management of the Company and, may be intercepted, monitored, recorded, copied, audited and inspected by the Company in accordance with the applicable laws for all lawful purposes, which shall include ensuring authorized use and management of the system, facilitate protection against unauthorized access, and to verify security procedures, survivability and operational security. The user agrees that the Company shall have the right to, at any time, view and store all email correspondence conducted by the user using the assigned work email address. Use of this system, constitutes explicit consent by the user to the Company or law enforcement agencies for monitoring, retrieval, recording, reading, copying, searching any information processed, stored or manipulated within the system, including but not limited to information stored locally on the hard drive or on other media in use with this unit internally or externally (e.g. USB storages, floppy disks, tapes, CD-ROMs, PDAs etc). If you are not an authorized user to access this system, TERMINATE the access immediately. Unauthorized or improper use of this system may lead to prosecution resulting in disciplinary, criminal or civil penalties. Suspected access violations or breach of security policy should be reported to hil.infosec@adityabirla.com. ALL RIGHTS ARE RESERVED.