employee handbook 1-1-15_no forms
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
CHAPTER 6. OPERATIONAL CONSIDERATIONS<br />
A. EMPLOYER PROPERTY<br />
All Company property must be maintained according to Company rules and regulations. The Company<br />
reserves the right to inspect all Company property to insure compliance with its rules and regulations,<br />
without <strong>no</strong>tice to the <strong>employee</strong> and/or in the <strong>employee</strong>'s absence.<br />
Prior authorization must be obtained before any Company property may be removed from the premises.<br />
An <strong>employee</strong>'s personal property, including, but <strong>no</strong>t limited to, lockers, packages, purses,and backpacks,<br />
may be inspected upon reasonable suspicion of unauthorized possession of Company property or for<br />
other legitimate business reasons.<br />
B. TECHNOLOGY SYSTEMS<br />
The Company provides an e-mail system, voice mail system, access to the Internet, and other tech<strong>no</strong>logy<br />
systems to assist <strong>employee</strong>s in conducting Company business. All information, data, and messages<br />
created, received, sent or stored in these systems are, at all times, the property of Company. The<br />
foregoing systems are to be used solely for business-related purposes. All existing Company policies<br />
apply to Employee conduct on the Internet and use of all tech<strong>no</strong>logy systems, including, but <strong>no</strong>t limited to,<br />
Company policies regarding intellectual property, misuse of Company property, discrimination,<br />
harassment, sexual harassment, information, and data security and confidentiality.<br />
The Company does <strong>no</strong>t allow these systems to be used in creating, receiving, sending, or storing data<br />
that may reasonably be considered to be offensive, defamatory, obscene, or harassing. Such data<br />
includes, but is <strong>no</strong>t limited to, sexual images and comments, racial and gender-based slurs, or anything<br />
that would reasonably be expected to offend someone based on their race, religion, age, national origin,<br />
physical or mental disability, sex, or any other factor protected by law. Any such use would violate this<br />
policy and may violate the Company’s policy against harassment. In particular, the display of any kind of<br />
sexually explicit image or document on any Company system is a violation of the Company’s policy on<br />
sexual harassment. Employees who are aware of the misuse of these systems by other <strong>employee</strong>s shall<br />
report the misuse to a manager immediately.<br />
All Employees should be aware that the Company has software and systems in place that are capable of<br />
monitoring and recording all network traffic to and from any computer Employees may use. The<br />
Company reserves the right, to the extent allowed under State and Federal law, to access, review, copy,<br />
and delete any of the information, data, or messages accessed through these systems with or without<br />
<strong>no</strong>tice to the Employee and/or in the Employee’s absence. This includes, but is <strong>no</strong>t limited to, all e-mail<br />
messages sent or received, all web site visits, all chat sessions, all news group activity (including groups<br />
visited, messages read, and Employee postings), and all file transfers into and out of the Company’s<br />
internal networks. The Company further reserves the right to retrieve previously deleted messages from<br />
e-mail or voice mail and monitor usage of the Internet, including web sites visited and any information<br />
<strong>employee</strong>s have downloaded. In addition, the Company may review Internet and tech<strong>no</strong>logy systems’<br />
activity and analyze usage patterns, and may choose to publicize this data to assure that tech<strong>no</strong>logy<br />
systems are devoted to legitimate business purposes. Accordingly, <strong>no</strong> Employee should have any<br />
expectation of privacy as to his/ her Internet or tech<strong>no</strong>logy systems usage and should <strong>no</strong>t use these<br />
systems for information they wish to keep private.<br />
Back to<br />
Top<br />
Employee Handbook Page 18