Associates shall comply with all IT Security policies, standards and guidelines relating to this Policy, including those relating to management of electronic information devices (for example, use of Internet services, use of design information, or the settings and operation of Company-provided electronic information devices).