03.11.2016 Views

Underwood Carpenter Employee Handbook - Latest 02 11 16

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

You should remember that whether you are using the internet and emails for business, personal and<br />

private use, your actions captured via images, posts, or comments will reflect upon the Company.<br />

Therefore, care should be taken to ensure that any information, or images posted and accessible<br />

by the general public, are not derogatory, inappropriate or damaging to the business or brand, or<br />

any person or organisation associated with the Company.<br />

Staff should be aware that use of the internet and email messages and systems should not be<br />

considered private. All staff should assume that their internet activities, and email messages may be<br />

read or heard by someone other than the intended recipient, even when a message is deleted, it<br />

still may be backed-up elsewhere or it may be possible to recreate the message. Therefore, please<br />

think very carefully before communicating confidential or sensitive information through the internet<br />

or email systems.<br />

You may, if specifically authorised, remotely access the Company’s files and emails by logging on<br />

to the system using your password. All passwords must be kept confidential and may not be<br />

divulged to anyone outside of the Company. Remote access may be withdrawn at any time.<br />

Once you have either given notice, or the Company has served notice to terminate employment,<br />

or in instances of long term absence (in excess of two weeks) from work, remote access will<br />

automatically be withdrawn.<br />

Staff are reminded that when using the internet and emails, including in their personal or private<br />

time they should ensure that their activities do not inadvertently undermine their contractual<br />

obligations and the relationship that they have with the Company, irrespective of whether they are<br />

directly breaching this policy. For example, making inappropriate comments about a colleague or<br />

the Company on a personal Facebook page. Such behaviour will be taken seriously and may<br />

result in disciplinary action, which may include dismissal in appropriate circumstances.<br />

Prohibited Activities<br />

The following activities are expressly prohibited during business, personal or private use (please note<br />

this list is not exhaustive):<br />

• Communicate or distribute inappropriate, offensive, libellous, discriminatory or defamatory<br />

material, including material about any individual or organisation, including the Company;<br />

• Claim to represent the views of the Company unless authorised to do so;<br />

• Transmit confidential or sensitive information over the internet, social media sites or via e-<br />

mail (other than by approved, secure systems for external e-mail);<br />

• Post derogatory comments about the Company, working for the Company or decisions<br />

made by the Company;<br />

• Post expressions of personal anger or abuse against another member of staff;<br />

• Publish untrue statements about another person which could damage their reputation or<br />

working relationships;<br />

• Knowingly accessing or attempting to access inappropriate Internet sites, downloading,<br />

storing or circulating material which is illegal or inappropriate to the workplace e.g. any<br />

material which is pornographic, racist, or involves illegal activity;<br />

• Send inappropriate messages/create posts which breach the standards and values set by<br />

the Company or which are abusive, threatening or provocative;<br />

• Download, possess, distribute or copy works (e.g. document, photograph, music or video)<br />

without the consent of the copyright owner;<br />

• Disclose personal data or information about any individual or colleague which could be in<br />

breach of the Data Protection Act 2008;<br />

• Gain or attempt to gain, access to those parts of the Company’s network for which<br />

• authorisation has not been granted, or to do so with the intention of damaging or<br />

<strong>Employee</strong> <strong>Handbook</strong> Issue Date: November 20<strong>16</strong><br />

43

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!