Internet Policy

  • Uploaded by: Ninoyz™
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Internet Policy as PDF for free.

More details

  • Words: 1,112
  • Pages: 17
Internet Policy

1. INTRODUCTION: • Offshoring, Inc. falls under the industry of BPO (Business Process Outsourcing) specializing in helping foreign companies in maintaining and managing offshore staff. Maintaining and managing offshore staff has become more important than ever, and its importance is just going to keep increasing; for we have entered the age of a true global economy as there has never been before in recorded history. Our company serves as the virtual office that is staffed by highly-skilled people with the use of high-speed web connection or the so-called internet.

The internet is a necessary component in our business and thus it is provided to all staff regardless of position, employment status and tenure. It is in this regard that certain parameters should be created to ensure that proper use of this resource is observed at all times. It is also necessary to define level of responsibilities of each involved personnel to be able to define the corresponding accountabilities as well.

Disclaimer: The Internet is a worldwide network of computers that contains millions of pages of information. Users are cautioned that many of these pages include offensive, explicit, and inappropriate material. In general, it is difficult to avoid at least some contact with this material while using the lnternet. Even innocuous search requests may lead to sites with highly offensive content. Users accessing the lnternet do so at their own risk and the company is not responsible for material viewed or downloaded by users from the Internet. To minimize these risks, the use of the Internet is governed by this policy paper.

PURPOSE:

• This policy aims to provide guidance for the appropriate use of the internet and to ensure that use of internet among Offshoring, Inc. employees is consistent with policies.

SCOPE:

• This policy applies to all employees of Offshoring, Inc

POLICIES: 1. All employees are authorized to have internet access with certain limitations as identified below: a. Downloading files via torrent, P2P software, etc. which are not work related. These files might contain viruses, which will endanger company’s information systems.

B. Accessing, viewing or any other method for retrieving nonjob related information such as online/network games, chat rooms, forums sites, bulletin boards, social sites like friendster.com, myspace.com and the like, or entertainment sites like youtube.com, megamovie.com or any other real-time connections which occupy continuous bandwidth in the network unless access to these sites is required / listed in employees job description or requested by the client. C. Sending harassing messages, derogatory comments, or unlawful discriminatory messages related to age, color, gender, sexual orientation, beliefs and religion using YM, ICQ, MSN, AIM and other internet messengers.

D. Unlawful reproduction or distribution of copyrighted information regardless of the source E. Seeking to gain unauthorized access to information resources using passwords belonging to others. F. Use of internet to access vendor sites such as tipidPC.com, sulit.com.ph, etc. to purchase personal items and to market personal and private business

2. Internet access is limited to working hours unless after hours access is expressly given by the project managers and shift supervisor. 3. Employees who wish to access the internet for personal reasons may do so in the Internet Lounge, the use of which is covered by a separate policy paper. 4. If an employee is found to have engaged in any unethical, illegal or unacceptable activities, such activities will subject the users to discipline consistent with iWeb’s Code of Conduct and the penalties indicated in this policy paper.

5. NO EXPECTATION OF PRIVACY 5.1 Employees are given computers and Internet access to assist them in the performance of their jobs. Employees should have no expectation of privacy in anything they create, store, send or receive using the company's computer equipment. The computer network is the property of the Company and may be used only for Company purposes. 5.2 Waiver of privacy rights. User expressly waives any right of privacy in anything they create, store, send or receive using the company's computer equipment or Internet access. User consents to allow company personnel access to and review of all materials created, stored, sent or received by User through any Company network or Internet connection.

5.3Monitoring of computer and Internet usage. The Company has the right to monitor and log any and all aspects of its Computer system including, but not limited to, monitoring Internet sites visited by Users, monitoring chat and newsgroups, monitoring file downloads, and all communications sent and received by users. The specific content of any transactions will not be monitored unless there is a suspicion of improper use.

6. The Company has the right to utilize software that makes it possible to identify and block access to Internet sites inappropriate in the workplace.

PENALTIES: •

DESCRIPTION OF OFFENSE Disseminating, viewing or storing commercial or personal advertisements, solicitations, promotions or any other unauthorized materials. Disseminating destructive code (e.g. viruses, trojan programs, self replicating programs, etc.)



TYPE OF OFFENSE B

C

Irresponsible, unprofessional, unethical and unlawful use of the computer system.

B

Copying of material/s protected under copyright law

C

Making the copyright materials available for others to copy.

B

Sending, transmitting, or otherwise distributing proprietary information, data, trade secrets or other confidential information belonging to the company

C

PENALTIES: •

DESCRIPTION OF OFFENSE



Bypassing Company’s computer network security.



Sending mass mails or chain letters



Playing computer or internet games.

A + Php 500



Engaging in online chat and/or conference which is not related to ones work

A



Uploading or downloading large files, which are not related to one’s work.

B



TYPE OF OFFENSE

C

A

PENALTIES: •

DESCRIPTION OF OFFENSE



Accessing streaming audio and/or video files not related to one’s work.



Watching YouTube or any similar sites not related to one’s work



Creating unnecessary load on network traffic associated with non business related uses of the internet which can also cause delay on local servers



Downloading official files or accepting email with attachments without first scanning the material with company approved virus checking software.



TYPE OF OFFENSE B

A + Php 500

B

A

PENALTIES: •

DESCRIPTION OF OFFENSE





Downloading games or other entertainment software including but not limited to screen savers

A



Displaying, storing or sending by email or any form of electronic communication such us bulletin boards, chat rooms, status message in YM, etc) material is fraudulent, harassing, embarrassing, intimidating, defamatory or otherwise inappropriate or unlawful.

B



Introducing any form of malicious software into the company network

C

TYPE OF OFFENSE

EFFECTIVITY AND VALIDITY

• This policy paper shall take effect immediately after approval and should be reviewed annually or as the need arises

Related Documents