sample policies
sample policies
sample policies
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
4<br />
Computer Use<br />
Although you want your employees to make the best possible use<br />
of computers, e-mail and the Internet, you must ensure that your<br />
system’s operation and security are not compromised. You also want<br />
<strong>policies</strong> and procedures that will minimize the potential for employee<br />
abuse of these powerful tools, whether it involves merely wasting<br />
time or engaging in harmful, unethical or even illegal activities.<br />
What’s at Issue<br />
Your computer, e-mail and Internet <strong>policies</strong> should cover the following basic areas:<br />
❒ Ownership. Clearly state who owns the hardware and software used in the<br />
workplace. In addition to information in employee handbooks, put your basic e-mail<br />
policy statement on screen so that it appears each time the employee logs on. At the end<br />
of the statement add a reminder that by proceeding to use the system, employees are<br />
giving consent to having their messages monitored.<br />
Example: “This computer network, including all data files and applications, is the property<br />
of ABC Corporation. All materials and information created, transmitted or stored on this system<br />
are the property of ABC and may be accessed by authorized personnel. This system is for<br />
business, not personal, use. Users should not have any expectation of privacy with respect to the<br />
materials and information stored on the system.”<br />
❒ Legal restrictions. Employees must follow all state and federal laws directly or<br />
indirectly relating to computer use. Your company could get into legal trouble if<br />
employees violated copyright laws or downloaded pirated software. If they sent abusing<br />
or harassing e-mail, an offended coworker might sue your company for sexual<br />
harassment. Plus, your company could be liable if you allowed someone who is a<br />
minor to access pornography over the Internet.<br />
❒ Monitoring. Make sure your firm reserves the right to view employees’ e-mail or<br />
otherwise monitor system usage. Remind employees that e-mail files, even those that<br />
have been deleted, are archived and backed up, and that visits to Internet sites are<br />
logged. Try to eliminate any expectation of privacy an employee might have. Reason:<br />
Many employers give employees a specific computer and allow them to create their<br />
20