Google Ads

Translate

CONTENT OF INTERNET USE POLICY


It is important that an organization use clear and specific language in an Internet use policy. The policy should inform employees that:
a) Internet use and e-mail will be monitored;
b) tracking software will be used to monitor Internet use and e-mail;
c) electronic data, including all Internet, e-mail, and instant messaging files, are the property of the employer, not the employee;
d) the employee agrees that electronic data, including all Internet, e-mail, and instant messaging files, are not private and are subject to employer access
and review, whether in transit or in storage;
e) the organization’s policy applies to all electronic communications, whether sent or received;
f) computer equipment and networks owned by the organization should not be used for personal matters and is provided solely for work-related use;
g) content that is offensive, obscene, profane, indecent, tortious, defamatory, illegal, harassing, or disruptive (including pornographic material or material that is offensive regarding sex, gender, sexual orientation, age, religious beliefs, political beliefs, race, or ethnic origin) should not be created, accessed, or distributed in any way using computer equipment and networks owned by the organization;
h) creating, accessing, or distributing material referred to in paragraph using computer equipment and networks owned by the organization is an act of gross misconduct;
i) confidential information and trade secrets should not be externally distributed in any way using computer equipment and networks owned by the
organization without authorization;
j) copyrighted or streaming content material, including software, music, and video programs, should not be downloaded from the Internet using computer equipment and networks owned by the organization without a license to do so and proper organizational authorization;
k) the employee agrees that e-mail accounts used for work purposes may be audited by the employer regardless of whether the e-mail service is provided by the employer or otherwise;
l) the employee agrees any computer used for work purposes may be audited by the employer regardless of the location of such computer and regardless of whether the computer is provided by the employer or otherwise;
m) the employee agrees to decrypt messages when required to do so by the employer for the purposes of business audit;
n) passwords used in respect of company information systems do not imply a right to privacy and do not prohibit an employer from review of any electronic data owned by the company;
o) breach of the organization’s Internet use policy should be reported to a designated member of staff as soon as possible; and
p) breach of the organization’s policy will lead to disciplinary measures, up to and including termination.

2 comments: