12.04.2017 Views

MMI Team Member Handbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Electronic Communication Resource Abuse<br />

<strong>MMI</strong> provides electronic communication and recordkeeping devices and systems for business use and<br />

for limited, necessary, personal use – for example, making transportation, financial or familial<br />

arrangements to facilitate attendance and good job performance. <strong>MMI</strong> expects that all such resources<br />

will be used lawfully, consistent with those purposes.<br />

All of us have been shocked, offended or embarrassed by what people thoughtlessly communicate in e‐<br />

mails, text messages and through social media. A good rule of thumb is to pause before following that<br />

impulse, and to do electronically only what you would do if you were writing the same message in a<br />

formal business letter. Here are some examples of abuses that probably would attract management<br />

attention and provoke disciplinary action if found unreasonable and legally unprotected:<br />

<br />

<br />

<br />

<br />

<br />

<br />

Communicating in ways that should reasonably be expected to violate others’ rights, subjecting<br />

<strong>MMI</strong> to a legal claim, such as making a maliciously false, defamatory statement about someone<br />

else, or committing unlawful harassment against someone else;<br />

Otherwise violating another’s legal rights, such as stealing or disclosing intellectual property<br />

(including guest personal and financial data, trade secrets and other confidential business<br />

information) that is not exclusively yours;<br />

Without authorization, purporting to commit <strong>MMI</strong> to a legal obligation, or otherwise purporting<br />

to speak for <strong>MMI</strong> on an important matter – for example, expressing what you believe to be<br />

<strong>MMI</strong>’s support for, or opposition to, a proposed, nearby real estate development, or insulting a<br />

guest who left no tip;<br />

Using your position with <strong>MMI</strong>, and your access to its communication resources, to cheat or<br />

defraud someone else – for example, running a vacation booking scam or soliciting personal<br />

payment for providing <strong>MMI</strong> services or accommodations;<br />

Carelessly or recklessly exposing <strong>MMI</strong>’s system or device to hacking, for example, by ignoring<br />

suspicious indicators such as phishing e‐mails, pop‐ups or downloads;<br />

Concealing or misrepresenting your knowledge of such activity by others with access to <strong>MMI</strong>’s<br />

systems and devices; for example, if you reasonably suspect that a co‐worker is stealing<br />

customer charge card data, report it, immediately.<br />

Social Media Abuse<br />

In some cases, your use of your own communication system or device might justify management<br />

attention and adverse consequences. For example, insulting a cheapskate guest via social media is a bad<br />

idea, regardless of whose device you use to do it. People who cannot resist such impulses probably<br />

should not be in the hospitality business. Once you put something on an insecure site, it’s susceptible to<br />

worldwide, eternal distribution. Don’t be surprised if it comes to management’s attention. We have a<br />

right to notice what you put out there.<br />

26

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!