Preview

Procedural Message: Electronic communications policy

Satisfactory Essays
Open Document
Open Document
336 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Procedural Message: Electronic communications policy
To: All Employees
From: (name), Human Resources
Subject: Electronic Communications Policy

This email is a reminder of the electronic communication policy which include telephone, electronic mail, text messaging and voicemails.
1. All communication documents or messages created or contained within the systems are company policy and records. The communication systems are to be used for business purposes only. Employees should not expect that any communication created, sent or received on the communication systems is private. We have the right to monitor, review, access, delete, reproduce, or disclose anything created, sent, or received on the communication systems. At any time, without notice, we have the right to disclose any communication to law enforcement officials without any notice.
2. No harassing, indecent, profane, abusive, obscene, vulgar, intimidating, or other offensive language or material may be sent or received by email, voice mail, or other forms of electronic communication. Any employees who encounters or receives such material must report the incident to his or her supervisor, manager, or to human resources.
3. Employees may not lock any documents or electronic transmission on company communication systems. We reserve the right to access, disclose and/or delete any such communications without notice. You are prohibited from opening any attachments to electronic mail messages unless you know the sender. You are also prohibited from sending any communication you have created outside the work place without permissions from the Director of the Department.
4. The company communication systems may not be used for the transmission or storage of commercial or personal advertisements, promotions, destructive programs or any other unauthorized or personal use. All persons accessing or using company communication systems must comply with all software licenses, copyrights, and laws governing intellectual property.
5. All employees must

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cross 9e TBB U05

    • 464 Words
    • 3 Pages

    the ethical and legal implications of breaching company policy on the use of electronic data…

    • 464 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It 255 Final Project

    • 1588 Words
    • 7 Pages

    Personal use of the telephone for long-distance and toll calls is not permitted. Employees should Practice discretion when making local personal calls and may be required to reimburse The Firm for any charges resulting from their personal use of the telephone. The mail system is reserved for business purposes only. Employees should refrain from sending or receiving personal mail at the workplace. To ensure effective telephone communications, employees should always use the approved greeting and speak in a courteous and professional manner. Please confirm information received from the caller, and hang up only after the caller has done so. Computer and E-mail Usage Computers and other media of electronic communications ("Media") are the property of the Firm which has a legitimate business interest in the proper utilization of its property. Therefore, any use of the Firm's property, and any electronic communications sent or received, may be monitored…

    • 1588 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Aistear is the curriculum framework for children from birth to six years. The Framework helps children grow and develop as confident and competent learners through fun, interesting and challenging experiences. The Aistear Toolkit is the place where you can access lots of practical resources online to help you get started with using Aistear.…

    • 1134 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    The purpose of keeping an electronic message system up to date is that we know which messages we dealt with also to avoid miscommunication. It also allows you to have more clear view at other messages.…

    • 372 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Ethics and Compliance

    • 1462 Words
    • 6 Pages

    The possession of information or knowledge of a transaction or attempted transaction must be informed to the employee’s direct supervisor. There is a strong encouragement towards…

    • 1462 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    (D3)Explain the appropriate methods of written communication to maintain confidentiality in the work place. What methods of communication can help to maintain confidentiality and privacy in the work place?…

    • 362 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Rule On Solicitation

    • 300 Words
    • 2 Pages

    2.) Why is it important whether e-mail is considered "solicitation" or "distribution"? May either of these forms of communication be banned in the work area?…

    • 300 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Copyright law applies to all information that is available to view and be stored. It applies to music downloads, personal details, medical history, financial records, and protects a company or creator from plagiarism and theft of owned ideas and work. When referencing someone else’s work it is important to acknowledging sources such as websites or books used. This also applies to images taken from imaging sites unless bought through stock photography. Electronically, access to information can be restricted and permissions granted to only those chosen by the authority, an example of this is an HR folder in a company network. Only authorised members of the HR department would have access to the folder and its contents as it would contain personal and confidential information. A person or a business proven to be breaking the Data Protection Act and Copyright laws will be heavily fined and can face a prison sentence.…

    • 1321 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    There are lots of companies have run the electronic auditing procedures to monitor the computer use of the employees. They perceived this matter seriously because the future achievement is their priority. But is the implementation of the employee monitoring system is necessary is still under a heat debate because it deals with their privacy and individual right. We should make a clear statement that company computing systems are provided as tools for business and all information created, accessed, or stored using these systems are the property of the company and are subject to monitoring, auditing, or review. Even though the management has the authority to do so as the management is their source of income, but it is appropriate for the management to also look into their welfare as equal priority. Therefore, this report will focus on both side of the scale and dwell into both the benefits and the harms on implementing such a major monitoring system. Below (Diagram 1.0) is the finding of a research conducted by The American Management Association as…

    • 2715 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    The e-mail system is not to be used to send offensive, sexually suggestive, obscene, lewd, demeaning, or disruptive messages. This includes, but is not limited to, messages that are inconsistent with the company’s policies on equal employment opportunity, anti-discrimination, and anti-harassment (including sexual harassment). Moreover, the e-mail system is not to be used to solicit or proselytize for commercial ventures, religious or political causes, or other non job-related solicitations.…

    • 696 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Companies Act 2006

    • 2116 Words
    • 9 Pages

    Under the Companies Act 19851, companies were permitted to send notices of meetings and copies of their annual accounts and directors reports by means of electronic communication, provided that the company and the recipient agreed. The 2006 Act allows for members and companies to communicate via electronic means and the scope of the term has been widened. The company communications provisions of the Companies Act 2006 are to be found under sections 1143 to 1148 in Part 37 and the accompanying Schedules 4 and 5.…

    • 2116 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    The use of Instant Messaging (IM) systems in the workplace has brought with it new legal and security issues that need to be considered. Industry analysts estimate that unauthorised IM use in the workplace is between 75% and 90%. This indicates that nearly everyone using IM in any given organisation is doing so without the manager's knowledge. This shows there are clearly no rules or usage guidelines in place, and no way of knowing what sensitive information could be being divulged. Furthermore, if managers are unaware of IM usage, then there is unlikely to be technology in place to control the risk of security breaches.…

    • 2174 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    memos by electronic mail to a friend at the other side of the office? Should…

    • 1708 Words
    • 7 Pages
    Good Essays
  • Good Essays

    * Remember that in spite of there being passwords to protect your privacy on the Internet, nothing is private, everything seen, forwarded and received by you can be monitored by people and seen by people for whom it was never intended. So while sending out emails or correspondence, official or otherwise, be cautious about what you send and what consequences it can have for you.…

    • 836 Words
    • 4 Pages
    Good Essays