Tuesday, November 26, 2019
Sample Internet and Email Policy for Employees
Sample Internet and schmelzglas Policy for EmployeesSample Internet and Email Policy for EmployeesAn effective internet and email policy that helps employees understand what is expected of them as it affects their work and workplace relationships is a must for employers and employees. You want to go on record to define what employees can do from work-provided devices or employee-owned devices that are used for or involve your employees, your workplace, or your company. According to Statista.com, In 2019, it is estimated that there will be around 2.77 billion social network users around the globe, up from 2.46 billion in 2017. Social network penetration worldwide is ever-increasing. In 2017,71 percentof internet users were social network users and these figures are expected to grow. With more than 85 percent of the people in the U.S. accessing social media, guidance about what employees can say and share has become more important. Employees dont mind guidelines because they dont want to act inappropriately and cross a line they didnt know existed. So, the development of a fair, understandable, sensible policy is strongly recommended as is training your employees by supplying many examples of proper and improper internet and email usage. Consider using this sample internet and email policy to provide clear guidance to your employees about what is appropriate use at work. Adapt it, of course, to suit the needs of your culture and the environment you want to provide employees at work. To be sure of legalities in your area and in your industry, please consult an attorney. Sample Internet and Email Policy for Employees Voicemail, email, and internet usage assigned to an employees computer or telephone extensions are solely for the purpose of conducting company business. Some job responsibilities at the company require access to the internet and the use of software in addition to the Microsoft Office suite of products. Only people appropriately authorized, for com pany purposes, may use the internetto access and download additional software. This authorization is generally exclusive to decisions that the information technology (IT) department makes in conjunction with philanthropisch resources. Software Access Procedure Software needed in addition to the Microsoft Office suite of products must be authorized by your manager and downloaded by the IT department. If you need access to software or websites bedrngnis currently on the company network, talk with your manager and consult with the IT department to explain what returns you expect to receive from the product. All reasonable requests that are not considered a network risk will be considered for you and other employees. The purpose of this policy is not to restrict employee access to products that will make you more productive. The goal is to minimize the risk to the organizations network. Company Owned Equipment Any device or computer including, but not limited to, desk phones, sm artphones, tablets, laptops, desktop computers, and iPads that the company provides for your use, should be used only for company business. Keep in mind that the company owns the devices and the information on these devices. If you leave the company for any reason, the company will require that you return the equipment on your last day of work. You may use personal electronic devices that are not connected to the company network to access any appropriate internet site during breaks and lunch. Internet Usage Internet use on company time or using company-owned devices that are connected to the company network is authorized to conduct company business only. Internet use brings the possibility of breaches of the security of confidential company information. Internet use also creates the possibility of contamination to our ordnungsprinzip via viruses or spyware. Spyware allows unauthorized people outside of the company potential access to company passwords and other confidential info rmation. Removing such programs from the company network requires IT staff to invest time and attention that is better devoted to making technological progress. For this reason and to assure the use of work time appropriately for work, we ask staff members to limit internet use. Additionally, under no circumstances may company-owned computers or other electronic equipment, including devices owned by the employee,be used on company time at work to obtain, view, or reach any pornographic, or otherwise immoral, unethical, or nonbusiness-related internet sites. Doing so can lead to disciplinary action up to and including termination of employment. Social Media Your employer understands that part of what you do in social media is outreach that recruits new employees and enhances our company brand. Many employees have social media responsibilities in their job description, including social media marketers, tech support, and recruiters. Your employer also understands that the relations hip of our employees to an online world that you spend time in 24/7 can lead to the blurring of work time and off work time. We strongly encourage you to limit the use of social media to work-related content and outreach during work hours. Additionally, you are prohibited from sharing any confidential or protected information that belongs to or is about the company. You are strongly encouraged not to share disparaging information that places your company or coworkers in an unfavorable light. The companys reputation and brand should be protected by all employees. The lives and actions of your coworkers should never be shared online. Please notenzeichen the preferences of fellow employees who are parents before you use the name of their children online. In social media participation from work devices or during working hours, social media content that discriminates against any protected classification including age, race, color, religion, gender, national origin, disability, or genetic information is prohibited. It is our companypolicy to also recognizesexual preference and weight as qualifying for discrimination protection. Any employee who participates in social mediawho violates this policywill be dealt with according to the companyharassment policy. Email Usage at the Company Email is to be used for company business only. Company confidential information must not be shared outside of the company, without authorization, at any time. You also are not to conduct personal business using the company computer or email. Please keep this in mind, also, as you consider forwarding non-business emails to associates, family or friends. Non-business related emails waste company time and attention. Viewing pornography, or sending pornographic jokes or stories via email, is considered sexual harassment and will be addressed according to our sexual harassment policy. Immediate termination is the most frequent disciplinary actionthat the Company may take in these cases. Emails That Discriminate Any email content that discriminates against any protected classification including age, race, color, religion, sex, national origin, disability, or genetic information is prohibited. It is our companypolicy to also recognizesexual preference and weight as qualifying for discrimination protection. Any employee who sends an email that violates this policywill be dealt with according to the harassment policy. These emails are prohibited at the company. Sending or forwarding nonbusiness emails will result in disciplinary action that may lead to employment termination. Company Owns Employee Email Keep in mind that the company owns any communication sent via email or that is stored on company equipment. Management and other authorized staff have the right to access any material in your email or on your computer at any time. Please do not consider your electronic communication, storage, or access to be private if it is created or stored on work systems. If you need additional information about the meaning of any of this communication, please reach out to your manager or the human resources staff for clarification.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.