02.02.2015 Views

sample policies

sample policies

sample policies

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4<br />

Computer Use<br />

Although you want your employees to make the best possible use<br />

of computers, e-mail and the Internet, you must ensure that your<br />

system’s operation and security are not compromised. You also want<br />

<strong>policies</strong> and procedures that will minimize the potential for employee<br />

abuse of these powerful tools, whether it involves merely wasting<br />

time or engaging in harmful, unethical or even illegal activities.<br />

What’s at Issue<br />

Your computer, e-mail and Internet <strong>policies</strong> should cover the following basic areas:<br />

❒ Ownership. Clearly state who owns the hardware and software used in the<br />

workplace. In addition to information in employee handbooks, put your basic e-mail<br />

policy statement on screen so that it appears each time the employee logs on. At the end<br />

of the statement add a reminder that by proceeding to use the system, employees are<br />

giving consent to having their messages monitored.<br />

Example: “This computer network, including all data files and applications, is the property<br />

of ABC Corporation. All materials and information created, transmitted or stored on this system<br />

are the property of ABC and may be accessed by authorized personnel. This system is for<br />

business, not personal, use. Users should not have any expectation of privacy with respect to the<br />

materials and information stored on the system.”<br />

❒ Legal restrictions. Employees must follow all state and federal laws directly or<br />

indirectly relating to computer use. Your company could get into legal trouble if<br />

employees violated copyright laws or downloaded pirated software. If they sent abusing<br />

or harassing e-mail, an offended coworker might sue your company for sexual<br />

harassment. Plus, your company could be liable if you allowed someone who is a<br />

minor to access pornography over the Internet.<br />

❒ Monitoring. Make sure your firm reserves the right to view employees’ e-mail or<br />

otherwise monitor system usage. Remind employees that e-mail files, even those that<br />

have been deleted, are archived and backed up, and that visits to Internet sites are<br />

logged. Try to eliminate any expectation of privacy an employee might have. Reason:<br />

Many employers give employees a specific computer and allow them to create their<br />

20

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!