position for which he or she is qualified, if such a position is available. If <strong>no</strong> such position is available, then one of the <strong>employee</strong>s will be required to leave the Company. The decision as to who shall leave will be made by the spouse-<strong>employee</strong>s. Additionally, at any time, the CEO/President of the company reserves the right to grant exceptions to this policy based on business needs and requirements. E. Dress Code Employees must wear proper business attire to allow them to conduct business at all times in a professional manner in their respective market areas. Back to Top Page 17 Savant Learning Systems
CHAPTER 6. OPERATIONAL CONSIDERATIONS A. EMPLOYER PROPERTY All Company property must be maintained according to Company rules and regulations. The Company reserves the right to inspect all Company property to insure compliance with its rules and regulations, without <strong>no</strong>tice to the <strong>employee</strong> and/or in the <strong>employee</strong>'s absence. Prior authorization must be obtained before any Company property may be removed from the premises. An <strong>employee</strong>'s personal property, including, but <strong>no</strong>t limited to, lockers, packages, purses,and backpacks, may be inspected upon reasonable suspicion of unauthorized possession of Company property or for other legitimate business reasons. B. TECHNOLOGY SYSTEMS The Company provides an e-mail system, voice mail system, access to the Internet, and other tech<strong>no</strong>logy systems to assist <strong>employee</strong>s in conducting Company business. All information, data, and messages created, received, sent or stored in these systems are, at all times, the property of Company. The foregoing systems are to be used solely for business-related purposes. All existing Company policies apply to Employee conduct on the Internet and use of all tech<strong>no</strong>logy systems, including, but <strong>no</strong>t limited to, Company policies regarding intellectual property, misuse of Company property, discrimination, harassment, sexual harassment, information, and data security and confidentiality. The Company does <strong>no</strong>t allow these systems to be used in creating, receiving, sending, or storing data that may reasonably be considered to be offensive, defamatory, obscene, or harassing. Such data includes, but is <strong>no</strong>t limited to, sexual images and comments, racial and gender-based slurs, or anything that would reasonably be expected to offend someone based on their race, religion, age, national origin, physical or mental disability, sex, or any other factor protected by law. Any such use would violate this policy and may violate the Company’s policy against harassment. In particular, the display of any kind of sexually explicit image or document on any Company system is a violation of the Company’s policy on sexual harassment. Employees who are aware of the misuse of these systems by other <strong>employee</strong>s shall report the misuse to a manager immediately. All Employees should be aware that the Company has software and systems in place that are capable of monitoring and recording all network traffic to and from any computer Employees may use. The Company reserves the right, to the extent allowed under State and Federal law, to access, review, copy, and delete any of the information, data, or messages accessed through these systems with or without <strong>no</strong>tice to the Employee and/or in the Employee’s absence. This includes, but is <strong>no</strong>t limited to, all e-mail messages sent or received, all web site visits, all chat sessions, all news group activity (including groups visited, messages read, and Employee postings), and all file transfers into and out of the Company’s internal networks. The Company further reserves the right to retrieve previously deleted messages from e-mail or voice mail and monitor usage of the Internet, including web sites visited and any information <strong>employee</strong>s have downloaded. In addition, the Company may review Internet and tech<strong>no</strong>logy systems’ activity and analyze usage patterns, and may choose to publicize this data to assure that tech<strong>no</strong>logy systems are devoted to legitimate business purposes. Accordingly, <strong>no</strong> Employee should have any expectation of privacy as to his/ her Internet or tech<strong>no</strong>logy systems usage and should <strong>no</strong>t use these systems for information they wish to keep private. Back to Top Employee Handbook Page 18