Sample Electronic Communication, Computer And Internet Policy

  • Uploaded by: Jonathan Bates
  • 0
  • 0
  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Sample Electronic Communication, Computer And Internet Policy as PDF for free.

More details

  • Words: 1,227
  • Pages: 4
Internet, Email and Instant Message Usage and Security Policy [This may need to be modified depending upon Company use of electronics and other factors] [Company] has created a policy regarding both electronic communication and Internet use. The following summarizes that policy. Any associate who would like to review the policy in its entirety should feel free to make arrangements to do that through Human Resources. [Company] provides Internet, e-mail and Instant Messaging (IM) capabilities to help you do your job faster and smarter, and be a well-informed business person. The facilities to provide that access represent a considerable commitment of company resources for telecommunications, networking, software, storage, etc. The Internet & E-mail usage policy is designed to set forth the Company’s expectations for the use of computers, electronic communications and the Internet. Violations of the policy will result in disciplinary action, up to and including termination of employment. The Internet, E-mail and IM capabilities are provided for business-related purposes (i.e., to communicate with customers and suppliers, to research relevant business topics and obtain useful business information. Associates will conduct themselves honestly and appropriately on the Internet and in E-mail and IM conversations, and respect the copyrights, software licensing rules, property rights, and privacy of others. It is a violation of Company policy for any employee, including system administrators and supervisors, with no business purpose, to satisfy their idle curiosity by accessing the files or communications of other users of the Company’s system. All existing Company policies apply to your conduct on the Internet , E-mail and IM, especially those that deal with intellectual property protection, privacy, misuse of company resources, sexual harassment, Treating Associates with Respect, information and data security, and confidentiality. The chats, newsgroups, blogs and e-mail of the Internet give each individual user the ability to disseminate Company messages and tell our business story. Associates must take special care to maintain the clarity, consistency and integrity of the Company's corporate image and posture. Anything an employee posts on the Internet using Company resources or referring to the Company can be construed, rightly or wrongly, as representing the Company's viewpoint. You should act with common sense and not do anything that would place the Company or persons in the Company in an inappropriate light. The Internet, E-mail and IM capabilities also can expose Company data and systems to significant risks if appropriate security discipline is not respected. That may mean preventing machines with sensitive data or applications from connecting to the Internet entirely, or it may mean that certain users may be prevented from using certain Internet features (e.g. file transfers). Security should be everyone's concern. Specific Provisions in the Policy Management and Administration



The Company has software and systems in place that can monitor and record all Internet and E-mail usage. You should be aware that the Company’s security systems are capable of recording each World Wide Web site visit, each chat, newsgroup or email message, and each file transfer into and out of internal networks. Due to business considerations, employees should not assume that they have an expectation of privacy as to Internet and E-mail usage.



The Company may inspect any and all files stored anywhere on its network or computer resources in order to assure compliance with policy.



Employees should not open or execute a file attached to an email message unless they are absolutely certain of the origin and content of the attachment. The use of email attachments is restricted to business use only.



The display, or distribution, of any kind of sexually explicit image or document on any Company system is a violation of Company policy. In addition, sexually explicit material may not be archived, stored, distributed, edited or recorded using the Company network or computing resources during or after business hours.



The display, or distribution, of any kind of written material or graphic regarding derogatory remarks or offensive material related to any governmental protected class (i.e. racial, religious, age, disability, sexual orientation, nationality, etc.) is a violation of Company policy. In addition, this information may not be archived, stored, distributed, edited or recorded using the Company network or computing resources during or after business hours.



The creation or distribution of E-mails soliciting items for sale or charity causes are a violation of Company policy unless prior approved by Human Resources.



The Company's Internet facilities and computing resources must not be used knowingly to violate the laws and regulations of the United States or any other nation, or the laws and regulations of any state, city, province or other local jurisdiction in any material way.



No employee may use Company facilities knowingly to download or distribute pirated software or data.



No employee may use the Company's Internet facilities to deliberately propagate any virus, worm, Trojan horse, trap-door or other types of destructive program code.



No employee may knowingly use the Company's Internet facilities to disable or overload any computer system or network, or to circumvent any system intended to protect the privacy or security of another user.



Only those senior executives who are duly authorized to speak to the media, to analysts, or in public gatherings on behalf of the company, may speak/write in the name of the Company to any newsgroup or chat room. Only those senior executives who are authorized to speak to the media, to analysts or in public gatherings on behalf of the Company, may grant such authority to newsgroup or chat room participants.



The Company recognizes the Internet has many uses outside of normal business needs. The Company allows personal usage under the following conditions with the understanding employees do not abuse corporate resources and adhere to all aspects of this policy. 

In the interest of keeping employees well informed, use of news briefing services like Pointcast are acceptable.



Employees with Internet access may download only software with direct business use, and must arrange to have such software properly installed, licensed and registered. Downloaded software must be used only under the terms of its license.

Technic al 

User IDs and passwords help maintain individual accountability for Internet resource usage. Employees must keep their passwords confidential. Company policy prohibits the sharing of user IDs or passwords.



Employees should schedule communications-intensive operations such as large file transfers, video downloads, mass e-mailings and the like for off-peak times.



Any file that is downloaded must be scanned for viruses before it is accessed or run.

Security 

The Company has installed a variety of firewalls, proxies, and Internet address screening programs and other security systems to assure the safety and security of the Company's networks. Any employee who attempts to disable, defeat or circumvent any Company security facility will be subject to immediate dismissal.



Files containing sensitive Company data that are transferred in any way across the Internet must be encrypted.



Employees must comply with the Remote Work Policy when not working within the [Company] facility. An employee can obtain a copy of the policy from their manager.



Use of programs that allow access into the network are strictly forbidden. This includes software like PC Anywhere, Timbuktu and any other program that allows another computer outside our organization to access either information or a computer. Requests for access by external means must be made through the IT and Development departments.

Related Documents


More Documents from ""