Documente Academic
Documente Profesional
Documente Cultură
IT World
Employment
policies
Internet & Software Use Policy
POLICY:
USE OF COMPANY NETWORK AND EMAIL GUIDELINES
The Society supports a Wide Area Network. Email within Societys network is for work related
correspondence among people who have accounts (Users).
1.Email correspondence, at all times, will be professional in tone. Abusive, fraudulent, harassing or
obscene messages and/or materials shall not be sent from, to, or stored on
Society systems. At all times, generally accepted standards of email etiquette are expected and the
following actions are prohibited:
Sharing of confidential data outside of the office via email unless the source(s) are
completely a trusted source.
Written or pictorial discriminatory slurs (even in joke form).
Written or pictorial sexual harassment.
Distribution of Agency data/ material without authorization.
Distribution of copyrighted material.
Any other written or pictorial data containing obscene, pornographic, violent, or hate
propaganda.
Creation of distribution of bulk email (UBE, AKA SPAM).
2.Making copies of system configuration files for personal use or to provide to a user external to the
Society is forbidden, as is downloading or installing security programs that reveal weaknesses in
systems security. For example, Society users shall not run password-cracking programs.
3.Individuals are not to share accounts, passwords or dial up modem telephone numbers, except
when specifically delegated (e.g. an absence).
4.Individuals shall not purposely engage in activity with the intent to circumvent Society security
measures or gain access to Society systems for which proper authorization has not been given.
5.All email correspondence should treated with the same care and diligence applied to hardcopy
memoranda.
USE OF SOFTWARE
It is the policy of The Society to respect the proprietary rights of a computer software developer.
As a user, you are required to comply with the license agreements associated with the computer
software products. Permitted activities in license agreements vary from product to product.
Generally, the following procedures should be followed:
1.Individuals may not make copies or modify copyrighted software, except to the extent permitted in
the license agreement.
2. Individuals may not download and/or use personally acquired software, public domain software,
electronic bulletin boards or shareware without prior approval from the Director, Technology
Operations.
3.Software which is not licensed for use on a network can generally be used on a standalone basis
on a computer which is connected to a network as long as it is not used on the network.
Where the licensed software is authorized for use on a network, then only the authorized number of
users should use the software on the network.
4.Acquisition of software packages must be approved by the Director, Technology Operations,
or designate. Any questions regarding the terms and conditions of copyrighted software
should be referred to the Director, Technology Operations, or designate.
4. Where, for the legitimate research purposes, a user wishes to access a site or deal with a subject
that may be considered prohibited, it must be discussed in advance, and approved, by her/his direct
supervisor who, if in doubt, will raise it with the Director, Technology Operations.
At any time, the Society reserves the right to monitor computer activities, including Internet usage
among its users.
Breach of security or materials is strictly prohibited at the Society or anywhere else. Security
breaches must be reported immediately to the Director, Technology Operations, or delegate. At all
times Society guidelines concerning Conflict of interest and Confidentiality shall apply while
utilizing the Societys computer system, including internet usage.
Failure to comply with the above mentioned directives may result in disciplinary up to and
including termination of employment. Illegal activity may be prosecuted
RESPONSIBILITY:
Department heads will be directly responsible, alongside Human resources
PROGRAM:
Depending on the situation case by case the following course of disciplinary action will be used with
no exception to any employee from any department.
Employee Name:__________________________
Signature:________________________________
Witness Name:____________________________
Signature:________________________________
References:
1: HR Council Canada (www.hrcouncil.ca)
http://hrcouncil.ca/hr-toolkit/internet-email-use.cfm
2: HR Council Canada (www.hrcouncil.ca
http://hrcouncil.ca/hr-toolkit/keeping-people-discipline.cfm