Acceptable Use Policy
Employee Acceptable Use Policy
E-mail Policies and Procedures
INSTANT MESSAGING
Instant Messaging Policies and Procedures
NETWORK AND INTERNET
Personal Responsibility
Permitted Use and Term
Availability and Access
Content and Communications
Privacy
Downloaded Files
Confidential Information
Prohibited Activities / Prohibited Uses
Compliance
Noncompliance
SOFTWARE USAGE
Software Usage Policies and Procedures
ACKNOWLEDGEMENT OF UNDERSTANDING
Acknowledgement of Receipt and Understanding (Spectorsoft, 2005, pp. 3-8).
ELECTRONIC ACCESS POLICY
The Company provides some, if not all, employees with electronic access, consisting of an e-mail system, a network connection, and Internet/Intranet access. This policy governs all use of the Company's network, Internet/Intranet access, and e-mail system at all Company locations and offices. This policy includes, but is not limited to, electronic mail, instant messaging, chat rooms, the Internet, news groups, electronic bulletin boards, the Company's Intranet and all other Company electronic messaging systems.
EMAIL
2. E-MAIL POLICIES AND PROCEDURES
The Company's e-mail system is designed to improve service to our customers, enhance internal communications, and reduce paperwork. Employees using the Company's e-mail system must adhere to the following policies and procedures:
The Company's e-mail system, network, and Internet/Intranet access are intended for business-use only. Employees may access e-mail and the Internet for personal use only during non-working hours, and strictly in compliance with the terms of this policy (Spectorsoft, 2005, pp. 3-8).
All information created, sent, or received via the Company's e-mail system, network, Internet, or Intranet, including all e-mail messages and electronic files, is the property of the Company. Employees should have no expectation of privacy regarding this information. The Company reserves the right to access, read, review, monitor, and copy all messages and files on its computer system at any time without notice. When deemed necessary, the Company reserves the right to disclose text or images to law enforcement agencies or other third parties without the employee's consent.
Any message or file sent via e-mail must have the employee's name attached.
Alternate Internet Service Provider connections to the Company's internal network are not permitted unless expressly authorized by the Company and properly protected by a firewall or other appropriate security device(s) and/or software.
Confidential information should not be sent via e-mail unless encrypted by Company approved encryption software and according to established Company procedure in effect at the time of transmittal. This includes the transmission of customer financial information, Social Security numbers, employee health records, or other confidential material.
Employees must provide the System Administrator and/or the Chief Information officer with all passwords.
Only authorized management personnel are permitted to access another person's e-mail without consent.
Employees should exercise sound judgment when distributing messages. Client-related messages should be carefully guarded and protected. Employees must also abide by copyright laws, ethics rules, and other applicable laws.
E-mail messages must contain professional and appropriate language at all times. Employees are prohibited from sending abusive, harassing, intimidating, threatening and discriminatory or otherwise offensive messages via e-mail. Sending abusive, harassing, intimidating, threatening and discriminatory or otherwise offensive messages via e-mail will result in disciplinary action up to and including termination (Spectorsoft, 2005, pp. 3-8).
E-mail usage must conform to the Company's harassment and discrimination policies.
Chain messages and executable graphics and/or programs should be deleted. Any employee engaging in the transmission of inappropriate e-mails, as determined by management, will be subject to disciplinary action, up to and including termination.
Misuse and/or abuse of electronic access, including but not limited to, personal use during working hours, copying or downloading copyrighted materials, visiting pornographic sites or sending abusive e-mail messages will result in disciplinary action, up to and including termination.
Violation of any of these policies will subject an employee to disciplinary action, up to and including termination (Spectorsoft, 2005, pp. 3-8).
INSTANT MESSAGING
3. INSTANT MESSAGING POLICIES AND PROCEDURES
Employees are prohibited from transmitting on or through any instant messaging service any material that is, in the sole discretion of the Company, determined to be unlawful, obscene, threatening, abusive, libelous, or hateful, or deemed to encourage, aid or promote conduct that would constitute a criminal offense, give rise to civil liability or otherwise violate any local, state, or national law.
Instant message usage must conform to the Company's harassment and discrimination policies (Spectorsoft, 2005, pp. 3-8).
All information created, sent, or received via instant messaging, the Company's network, Internet, or Intranet, including all e-mail messages and electronic files, is the property of the Company. Employees should have no expectation of privacy regarding this information. The Company reserves the right to access, read, review, monitor, and copy all messages and files on its computer system at any time without notice. When deemed necessary, the Company reserves the right to disclose text or images to law enforcement agencies or...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now