31.03.2016 Views

employee handbook 1-1-15_no forms

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CHAPTER 6. OPERATIONAL CONSIDERATIONS<br />

A. EMPLOYER PROPERTY<br />

All Company property must be maintained according to Company rules and regulations. The Company<br />

reserves the right to inspect all Company property to insure compliance with its rules and regulations,<br />

without <strong>no</strong>tice to the <strong>employee</strong> and/or in the <strong>employee</strong>'s absence.<br />

Prior authorization must be obtained before any Company property may be removed from the premises.<br />

An <strong>employee</strong>'s personal property, including, but <strong>no</strong>t limited to, lockers, packages, purses,and backpacks,<br />

may be inspected upon reasonable suspicion of unauthorized possession of Company property or for<br />

other legitimate business reasons.<br />

B. TECHNOLOGY SYSTEMS<br />

The Company provides an e-mail system, voice mail system, access to the Internet, and other tech<strong>no</strong>logy<br />

systems to assist <strong>employee</strong>s in conducting Company business. All information, data, and messages<br />

created, received, sent or stored in these systems are, at all times, the property of Company. The<br />

foregoing systems are to be used solely for business-related purposes. All existing Company policies<br />

apply to Employee conduct on the Internet and use of all tech<strong>no</strong>logy systems, including, but <strong>no</strong>t limited to,<br />

Company policies regarding intellectual property, misuse of Company property, discrimination,<br />

harassment, sexual harassment, information, and data security and confidentiality.<br />

The Company does <strong>no</strong>t allow these systems to be used in creating, receiving, sending, or storing data<br />

that may reasonably be considered to be offensive, defamatory, obscene, or harassing. Such data<br />

includes, but is <strong>no</strong>t limited to, sexual images and comments, racial and gender-based slurs, or anything<br />

that would reasonably be expected to offend someone based on their race, religion, age, national origin,<br />

physical or mental disability, sex, or any other factor protected by law. Any such use would violate this<br />

policy and may violate the Company’s policy against harassment. In particular, the display of any kind of<br />

sexually explicit image or document on any Company system is a violation of the Company’s policy on<br />

sexual harassment. Employees who are aware of the misuse of these systems by other <strong>employee</strong>s shall<br />

report the misuse to a manager immediately.<br />

All Employees should be aware that the Company has software and systems in place that are capable of<br />

monitoring and recording all network traffic to and from any computer Employees may use. The<br />

Company reserves the right, to the extent allowed under State and Federal law, to access, review, copy,<br />

and delete any of the information, data, or messages accessed through these systems with or without<br />

<strong>no</strong>tice to the Employee and/or in the Employee’s absence. This includes, but is <strong>no</strong>t limited to, all e-mail<br />

messages sent or received, all web site visits, all chat sessions, all news group activity (including groups<br />

visited, messages read, and Employee postings), and all file transfers into and out of the Company’s<br />

internal networks. The Company further reserves the right to retrieve previously deleted messages from<br />

e-mail or voice mail and monitor usage of the Internet, including web sites visited and any information<br />

<strong>employee</strong>s have downloaded. In addition, the Company may review Internet and tech<strong>no</strong>logy systems’<br />

activity and analyze usage patterns, and may choose to publicize this data to assure that tech<strong>no</strong>logy<br />

systems are devoted to legitimate business purposes. Accordingly, <strong>no</strong> Employee should have any<br />

expectation of privacy as to his/ her Internet or tech<strong>no</strong>logy systems usage and should <strong>no</strong>t use these<br />

systems for information they wish to keep private.<br />

Back to<br />

Top<br />

Employee Handbook Page 18

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!