An Internet Usage Policy Provides Employees with Rules and Guidelines About the Appropriate Use of Company Equipment

Only available on StudyMode
  • Download(s) : 146
  • Published : November 20, 2011
Open Document
Text Preview
An Internet usage policy provides employees with rules and guidelines about the appropriate use of company equipment, network and Internet access. Having such a policy in place helps to protect both the business and the employee; the employee will be aware that browsing certain sites or downloading files is prohibited and that the policy must be adhered to or there could be serious repercussions, thus leading to fewer security risks for the business as a result of employee negligence. The Internet Usage Policy is an important document that must be signed by all employees upon starting work. Below is a Sample Internet Usage Policy that covers the main points of contention dealing with Internet and computer usage. The policy can then be tailored to the requirements of the specific organization. Internet usage policy

This Sample Internet Usage Policy applies to all employees of company who have access to computers and the Internet to be used in the performance of their work. Use of the Internet by employees of company is permitted and encouraged where such use supports the goals and objectives of the business. However, access to the Internet through company is a privilege and all employees must adhere to the policies concerning Computer, Email and Internet usage. Violation of these policies could result in disciplinary and/or legal action leading up to and including termination of employment. Employees may also be held personally liable for damages caused by any violations of this policy. All employees are required to acknowledge receipt and confirm that they have understood and agree to abide by the rules hereunder. Computer, email and internet usage

* Company employees are expected to use the Internet responsibly and productively. Internet access is limited to job-related activities only and personal use is not permitted * Job-related activities include research and educational tasks that may be found via the Internet that would help in an employee's role * All Internet data that is composed, transmitted and/or received by company's computer systems is considered to belong to company and is recognized as part of its official data. It is therefore subject to disclosure for legal reasons or to other appropriate third parties * The equipment, services and technology used to access the Internet are the property of company and the company reserves the right to monitor Internet traffic and monitor and access data that is composed, sent or received through its online connections * Emails sent via the company email system should not contain content that is deemed to be offensive. This includes, though is not restricted to, the use of vulgar or harassing language/images * All sites and downloads may be monitored and/or blocked by company if they are deemed to be harmful and/or not productive to business * The installation of software such as instant messaging technology is strictly prohibited

Unacceptable use of the internet by employees includes, but is not limited to: * Access to sites that contain obscene, hateful, pornographic, unlawful, violent or otherwise illegal material * Sending or posting discriminatory, harassing, or threatening messages or images on the Internet or via company's email service * Using computers to perpetrate any form of fraud, and/or software, film or music piracy * Stealing, using, or disclosing someone else's password without authorization * Downloading, copying or pirating software and electronic files that are copyrighted or without authorization * Sharing confidential material, trade secrets, or proprietary information outside of the organization. * Hacking into unauthorized websites

* Sending or posting information that is defamatory to the company, its products/services, colleagues and/or customers * Introducing malicious software onto the company network and/or jeopardizing the security of the organization's electronic communications systems...
tracking img