免费预览已结束,剩余1页可下载查看
下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
COMPUTER USE POLICY: policy restricting personal use of employers computer and/or employers networkCOMPUTER USE POLICYSECTION ONE.PURPOSEA. To remain competitive, better serve our customers and provide our employees with the best tools to do their jobs, _name of business or owner of computer system makes available to our workforce access to one or more forms of electronic media and services, including computers, e-mail, telephones, voicemail, fax machines, external electronic bulletin boards, wire services, online services, intranet, Internet and the World Wide Web.B. _Name of business or owner of computer system encourages the use of these media and associated services because they can make communication more efficient and effective and because they are valuable sources of information about vendors, customers, technology, and new products and services. However, all employees and everyone connected with the organization should remember that electronic media and services provided by the company are company property and their purpose is to facilitate and support company business. All computer users have the responsibility to use these resources in a professional, ethical, and lawful manner.C. To ensure that all employees are responsible, the following guidelines have been established for using e-mail and the Internet. No policy can lay down rules to cover every possible situation. Instead, it is designed to express _name of business or owner of computer system philosophy and set forth general principles when using electronic media and services.SECTION TWO.PROHIBITED COMMUNICATIONSElectronic media cannot be used for knowingly transmitting, retrieving, or storing any communication that is:1. Discriminatory or harassing;2. Derogatory to any individual or group;3. Obscene, sexually explicit or pornographic;4. Defamatory or threatening;5. In violation of any license governing the use of software; or6. Engaged in for any purpose that is illegal or contrary to _name of business or owner of computer system policy or business interests.7. Connection of personal computer to employers network without having the computer checked by Magnutech Inc., to insure no threatening viruses / programs infect the employers network.SECTION THREE.PERSONAL USEThe computers, electronic media and services provided by _name of business or owner of computer system are primarily for business use to assist employees in the performance of their jobs. Limited, occasional, or incidental use of electronic media (sending or receiving) for personal, nonbusiness purposes is understandable and acceptable, and all such use should be done in a manner that does not negatively affect the systems use for their business purposes. However, employees are expected to demonstrate a sense of responsibility and not abuse this privilege.SECTION FOUR.ACCESS TO EMPLOYEE COMMUNICATIONSA. Generally, electronic information created and/or communicated by an employee using e-mail, word processing, utility programs, spreadsheets, voicemail, telephones, Internet and bulletin board system access, and similar electronic media is not reviewed by the company. However, the following conditions should be noted:_Name of business or owner of computer system does routinely gather logs for most electronic activities or monitor employee communications directly, e.g., telephone numbers dialed, sites accessed, call length, and time at which calls are made, for the following purposes:1. Cost analysis;2. Resource allocation;3. Optimum technical management of information resources; and4. Detecting patterns of use that indicate employees are violating company policies or engaging in illegal activity.B. _Name of business or owner of computer system reserves the right, at its discretion, to review any employees electronic files and messages to the extent necessary to ensure electronic media and services are being used in compliance with the law, this policy and other company policies.C. Employees should not assume electronic communications are completely private. Accordingly, if they have sensitive information to transmit, they should use other means.SECTION FIVE.SOFTWARETo prevent computer viruses from being transmitted through the companys computer system, unauthorized downloading of any unauthorized software is strictly prohibited. Only software registered through _name of business or owner of computer system may be downloaded. Employees should contact Magnutech Inc. (the system administrator) if they have any questions.SECTION SIX.SECURITY/APPROPRIATE USEA. Employees must respect the confidentiality of other individuals electronic communications. Except in cases in which explicit authorization has been granted by company management, employees are prohibited from engaging in, or attempting to engage in:1. Monitoring or intercepting the files or electronic communications of other employees or third parties;2. Hacking or obtaining access to systems or accounts they are not authorized to use;3. Using other peoples log-ins or passwords; and4. Breaching, testing, or monitoring computer or network security measures.B. No e-mail or other electronic communications can be sent that attempt to hide the identity of the sender or represent the sender as someone else.C. Electronic media and services should not be used in a manner that is likely to cause network congestion or significantly hamper the ability of other people to access and use the system.D. Anyone obtaining electronic assess to other companies or individuals materials must respect all copyrights and cannot copy, retrieve, modify or forward copyrighted materials except as permitted by the copyright owner.SECTION SEVEN.ENCRYPTIONEmployees can use encryption software supplied to them by Magnutech Inc., the systems administrator for purposes of safeguarding sensitive or confidential business information. Employees who use encryption on files stored on a company computer must provide their supervisor with a sealed hard copy record (to be retained in a secure location) of all of the passwords and/or encryption keys necessary to access the files.SECTION EIGHT.PARTICIPATION IN ONLINE FORUMSA. Employees should remember that any messages or information sent on company-provided facilities to one or more individuals via an electronic networkfor example, Internet mailing lists, bulletin boards, and online servicesare statements identifiable and attributable to _name of business or owner of computer system.B. _Name of business or owner of computer system recognizes that participation in some forums might be important to the performance of an employees job. For instance, an employee might find the answer to a technical problem by consulting members of a news group devoted to the technical area.SECTION NINE.VIOLATIONSAny employee who abuses the privilege of their access to e-mail or the Internet in violation of this policy will be subject to corrective action, including possible termination of employment, legal action, and criminal liability.SECTION TEN.EMPLOYEE AGREEMENT ON USE OF E-MAIL AND THE INTERNETI have read, understand, and agree to comply with the foregoing policies, rules, and conditions governing the use of the Comp
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 开车安全培训课件
- 寒假假期安全班会课件
- 台风 安全培训课件
- 《小石潭记》练习题及答案1
- 化工企业新员工上岗考核试卷及答案
- 2025年云南公务员考试试题解析
- 初级质量工程师考试试题及答案
- 清明三月三安全课件
- 2025年康复医学治疗技术师资格历年真题题
- 2025年《劳动合同法》知识竞赛试题及答案
- 2025 高中旅游地理之旅游信息服务课件
- 北师大版四年级上册期中测试数学试卷(含解析)2024-2025学年辽宁省锦州市古塔区敬业第三小学校
- 锁骨骨折课件
- 结构加固改造之结构构件加固
- cognos培训教程与函数ibm102report studio讲解
- YY/T 0031-2008输液、输血用硅橡胶管路及弹性件
- GB/T 15843.1-2017信息技术安全技术实体鉴别第1部分:总则
- 北京某航天公司经营管理诊断报告课件
- 祥符东单元控规调整
- 基因编辑技术的概念和原理课件
- 班组班前安全教育活动记录表
评论
0/150
提交评论