Employee Acceptable Use Policy Company Manual

PAGES
9
WORDS
2398
Cite

Acceptable Use Policy Employee Acceptable Use Policy

E-mail Policies and Procedures

INSTANT MESSAGING

Instant Messaging Policies and Procedures

NETWORK AND INTERNET

Personal Responsibility

Permitted Use and Term

Availability and Access

Content and Communications

Privacy

Downloaded Files

Confidential Information

Prohibited Activities / Prohibited Uses

Compliance

Noncompliance

SOFTWARE USAGE

Software Usage Policies and Procedures

ACKNOWLEDGEMENT OF UNDERSTANDING

Acknowledgement of Receipt and Understanding (Spectorsoft, 2005, pp. 3-8).

ELECTRONIC ACCESS POLICY

The Company provides some, if not all, employees with electronic access, consisting of an e-mail system, a network connection, and Internet/Intranet access. This policy governs all use of the Company's network, Internet/Intranet access, and e-mail system at all Company locations and offices. This policy includes, but is not limited to, electronic mail, instant messaging, chat rooms, the Internet, news groups, electronic bulletin boards, the Company's Intranet and all other Company electronic messaging systems.

EMAIL

2. E-MAIL POLICIES AND PROCEDURES

The Company's e-mail system is designed to improve service to our customers, enhance internal communications, and reduce paperwork. Employees using the Company's e-mail system must adhere to the following policies and procedures:

The Company's e-mail system, network, and Internet/Intranet access are intended for business-use only. Employees may access e-mail and the Internet for personal use only during non-working hours, and strictly in compliance with the terms of this policy (Spectorsoft, 2005, pp. 3-8).

All information created, sent, or received via the Company's e-mail system, network, Internet, or Intranet, including all e-mail messages and electronic files, is the property of the Company. Employees should have no expectation of privacy regarding this information. The Company reserves the right to access, read, review, monitor, and copy all messages and files on its computer system at any time without notice. When deemed necessary, the Company reserves the right to disclose text or images to law enforcement agencies or other third parties without the employee's consent.

Any message or file sent via e-mail must have the employee's name attached.

Alternate Internet Service Provider connections to the Company's internal network are not permitted unless expressly authorized by the Company and properly protected by a firewall or other appropriate security device(s) and/or software.

Confidential information should not be sent via e-mail unless encrypted by Company approved encryption software and according to established Company procedure in effect at the time of transmittal. This includes the transmission of customer financial information, Social Security numbers, employee health records, or other confidential material.

Employees must provide the System Administrator and/or the Chief Information officer with all passwords.

Only authorized management personnel are permitted to access another person's e-mail without consent.

Employees should exercise sound judgment when distributing messages. Client-related messages should be carefully guarded and protected. Employees must also abide by copyright laws, ethics rules, and other applicable laws.

E-mail messages must contain professional and appropriate language at all times. Employees are prohibited from sending abusive, harassing, intimidating, threatening and discriminatory or otherwise offensive messages via e-mail. Sending abusive, harassing, intimidating, threatening and discriminatory or otherwise offensive messages via e-mail will result in disciplinary action up to and including termination (Spectorsoft, 2005, pp. 3-8).

E-mail usage must conform to the Company's harassment and discrimination policies.

Chain messages and executable graphics and/or programs should be deleted. Any employee engaging in the transmission of inappropriate e-mails, as determined by management, will be subject to disciplinary action, up to and including termination.

Misuse and/or abuse of electronic access, including but not limited to, personal use during working hours, copying or downloading copyrighted materials, visiting pornographic sites or sending abusive e-mail messages will result in disciplinary action, up to and including termination.

Violation of any of these policies will subject an employee to disciplinary action, up to and including termination (Spectorsoft, 2005, pp. 3-8).

INSTANT MESSAGING

3. INSTANT MESSAGING POLICIES AND PROCEDURES

Employees are prohibited from transmitting on or through any instant messaging service any material that is, in the sole discretion of the Company, determined to be unlawful, obscene, threatening, abusive, libelous, or hateful, or deemed to encourage, aid or promote conduct that would constitute a criminal offense, give rise to civil liability or otherwise violate any local, state, or national law.

Instant message usage must conform to the Company's harassment and discrimination policies (Spectorsoft, 2005, pp. 3-8).

All information created, sent, or received via instant messaging, the Company's network, Internet, or Intranet, including all e-mail messages and electronic files, is the property of the Company. Employees should have no expectation of privacy regarding this information. The Company reserves the right to access, read, review, monitor, and copy all messages and files on its computer system at any time without notice. When deemed necessary, the Company reserves the right to disclose text or images to law enforcement agencies or...

...

PERSONAL RESPONSIBILITY
By accepting an account password, related information, and accessing the Company's Network or Internet system, an employee agrees to adhere to the Company policies regarding their use. You also agree to report any misuse or policy violation(s) to your supervisor or the Company's Chief Information Officer.

5. PERMITTED USE AND TERM

Use of the Network and the Internet is a privilege, not a right. Use of Network and Internet access extends throughout an employee's term of employment, providing the employee does not violate the Company's policies regarding Network, Internet or Intranet use.

6. AVAILABILITY AND ACCESS

The Company reserves the right to suspend access at any time, without notice, technical reasons, possible policy violations, security or other concerns.

7. CONTENT AND COMMUNICATIONS

The Company at its sole discretion will determine what materials, files, information, software, communications, and other content and/or activity will be permitted or prohibited.

8. PRIVACY

The Company reserves the right to monitor, inspect, copy, review, and store at any time, without prior notice, any and all usage of the Network and the Internet, as well as any and all materials, files, information, software, communications, and other content transmitted, received or stored in connection with this usage. All such information, content, and files are the property of eth Company. An employee should have no expectation of privacy regarding them.

9. DOWNLOADED FILES

Files are not to be downloaded from the Internet without the prior authorization of management. Any files authorized for download from the Internet must be scanned with virus detection software before being opened. Employees are reminded that information obtained from the Internet is not always reliable and should be verified for accuracy before use.

10. CONFIDENTIAL INFORMATION

Employees may have access to confidential information about the Company, other employees and clients. With the approval of management, employees may use e-mail to communicate confidential information internally to those with a need to know. For purposes of this policy, confidential information includes, but is not limited to:

Procedures for computer access and passwords of the Company's clients and customers.

Lists of present clients and customers and the names of individuals at each client or customer location with whom the Company deals.

Prospect lists for actual or potential clients and customers of the Company and contact persons at such actual and potential clients and customers

Any other information relating to the Company's research, development, inventions, purchasing, engineering, marketing, merchandising, and selling (Spectorsoft, 2005, pp. 3-8).

11. PROHIBITED ACTIVITIES

Employees are prohibited from using the Company's e-mail system, network, or Internet/Intranet access for the following activities:

Printing or distributing copyrighted materials. This includes, but is not limited to, software, articles and graphics protected by copyright.

Sending, printing or otherwise disseminating the Company's proprietary data, or any other information deemed confidential by the Company, to unauthorized persons.

Operating a business, soliciting money for personal gain or otherwise engaging in commercial activity outside the scope of employment

Searching for outside employment.

Making offensive or harassing statements based on race, color, religion, national origin, veteran status, ancestry, disability, age, sex, or sexual orientation.

Sending or forwarding messages containing defamatory, obscene, offensive, or harassing statements.

Sending ethnic, sexual-preference or gender-related slurs and/or jokes via e-mail.

Sending or soliciting sexually oriented messages or images.

Attempting to access or visit sites featuring pornography, terrorism, espionage, theft, or drugs.

Gambling or engaging in any other criminal activity in violation of local, state, or federal law.

Engaging in unethical activities or content

Participating in activities, including the preparation or dissemination of content which could damage the Company's professional image, reputation and/or financial stability.

Using another employee's password or impersonating another person while communicating or accessing the Network or Internet (Spectorsoft, 2005, pp. 3-8).

12. COMPLIANCE

Though each individual is responsible for his/her own actions, management personnel are responsible for ensuring employee compliance with Company policy.

Any employee aware of a policy violation should immediately report the violation to their supervisor, the Company's Chief Information Officer and/or the Human Resource manager.

Employees who violate this policy and/or use the Company's e-mail system, network, Internet, or Intranet access for improper purposes will be subject to disciplinary action, up to and including termination.

13. NONCOMPLIANCE

Violations of these policies will result in disciplinary action up to and including termination.

14. ELECTRONIC ACCESS

I hereby certify that I have read and fully understand the contents of the Electronic Access Policy. Furthermore, I have been given the opportunity to discuss any information contained therein or any concerns that I may have. I understand that my employment and my continued employment is based in part upon my willingness to abide by and follow the Company's policies, rules, regulations and procedures. I acknowledge that the Company reserves the right to modify or amend its…

Sources Used in Documents:

Works Cited

Armour, S. (2006, February 20). Companies keep an eye on workers Internet use. USA Today. Retrieved October 30, 2011 from: http://www.usatoday.com/tech/news/internetprivacy/2006-02-20-internet-abuse_x.htm

Arnesan, D.W. & Weis, W.L. (2007). Developing an effective company policy for employee internet and email use. Journal of Organizational Culture, Communications and Conflict (11)2, 53-65. Retrieved October 30, 2011 from: http://www.alliedacademies.org/Publications/Papers/JOCCC%20Vol%2011%20No%202%202007.pdf#page=59

Case, C.J. & Young, K.S. (2002). Employee internet use policy: An examination of perceived effectiveness. IACIS Issues in Information Systems, 82-88. Retrieved October 30, 2011 from: http://www.iacis.org/iis/2002_iis/PDF%20Files/CaseYoung.pdf

Danchev, D. (2003). Building and implementing a successful information security policy. Retrieved October 30, 2011 from: http://www.itrevizija.ba/materijal/security-policy.pdf
Internet acceptable usage policy guidelines. (n.d.). Mississippi Office of the State Auditor. Retrieved October 30, 2011 from: http://www.osa.state.ms.us/downloads/iupg.pdf
M86 Security. (2011). Acceptable use policy and compliance. Retrieved October 30, 2011 from: http://www.m86security.com/resources/acceptable-use-policy-and-compliance.asp
Spectorsoft. (2005). Implementing an Internet acceptable use policy. Retrieved October 30, 2011 from: http://www.spectorcne.com/images/PDF/WP_AcceptableUsePolicy.pdf
Sykes, C.B. (2005). The importance of internet acceptable use policies for large businesses. Retrieved October 30, 2011 from: http://www.infosecwriters.com/text_resources/pdf/IAUP_Sykes.pdf


Cite this Document:

"Employee Acceptable Use Policy" (2011, October 31) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/employee-acceptable-use-policy-116394

"Employee Acceptable Use Policy" 31 October 2011. Web.25 April. 2024. <
https://www.paperdue.com/essay/employee-acceptable-use-policy-116394>

"Employee Acceptable Use Policy", 31 October 2011, Accessed.25 April. 2024,
https://www.paperdue.com/essay/employee-acceptable-use-policy-116394

Related Documents

Acceptable Use Policy for the Fire Department Designing, Developing, Implementing Acceptable Use Policy (AUP) Computers integral part fabric daily life fire service. Once a luxury, computer a necessity a multitude functions: computer aided dispatch, fire incident reporting, creating work schedules, outlining Purpose of the Acceptable Use Policy The fire department owns and operates the computing systems that are provided for use by the employees, fire men and women. The computing systems support the

Acceptable Use Policy AUP Policy Review: Los Angeles Unified School District With continuously evolving technologies, it is important for organizations to set up standards that helps mitigate potential liability in regards to staff potentially of using or misusing such technologies. It is obvious that an Acceptable Use Policy (AUP) is a very important policy within modern organizations in order to define what acceptable employee behavior when accessing company resources is. AUP's help

Acceptable Use Policy at Cincom Systems Policy for Cincom Systems Cincom Systems' customers are the foundation of our success. This acceptable IT use policy statement is designed to provide our employees with the agility and flexibility to meet customer needs with accuracy and speed, while also protecting our IT systems, data, and records. This document defines the baseline of expectations for Cincom employees in interacting with all Cincom computing systems, platforms,

Policy Paper
PAGES 14 WORDS 4318

Policy Paper: Annotated Bibliography1. MIERNICKA, I. (2019). CHAPTER TWENTY DRESS CODE IN A WORKPLACE AS A CHALLENGE FOR LABOUR LAW RELATIONSHIPS IRMINA MIERNICKA.�Health at Work, Ageing and Environmental Effects on Future Social Security and Labour Law Systems, 434.https://books.google.co.ke/books?hl=en&lr=&id=szWEDwAAQBAJ&oi=fnd&pg=PA434&dq=importance+of+dress+code+policy+to+small+companies+and+laws+governing+such+policies+in+the+United+States&ots=bQmfcU8Ey6&sig=YKg7CmjgG_Wc1-43hquAXNaRiEM&redir_esc=y#v=onepage&q&f=falseThe article examines and analyzes various regulations and legislation governing dress code policies in the United States. For instance, Various legislations governing the conduct of small companies concerning employees� dress code are majorly

Internet has grown exponentially since its first introduction to the public. The precursor to the Internet was the ARPANET. The Advanced Research Projects Agency (ARPA) of the Department of Defense (Carlitz and Zinga, 1997) and the National Science Foundation (NSF) were the primary creators of the ARPANET. Subsequently however, efforts from private entities and universities have helped develop the network infrastructure, as it exists today. "The goals of ARPA's

Employee Handbook Privacy Section ABC Widget Company: Employee Handbook Privacy Section What privacy rights issues should be addressed? In the Age of Information, there are increasing concerns being voiced about what can legitimately be expected to be kept private, and how these issues affect employees' rights in the workplace. According to Hayden, Hendricks and Novak (1990, most adults spend approximately one-half of their waking hours in the workplace today, and it is therefore