Email Policy

Published on February 2017 | Categories: Documents | Downloads: 25 | Comments: 0 | Views: 265
of 23
Download PDF   Embed   Report

Comments

Content

 

Email Policy

   

INTRODUCTION • Electronic Mail (Email) System or Services: Any messaging system that depends on computing facilities create, send, forward, r eplydisplay, reply to, transmit,to store, hold, copy, download, view, read, or print computer records for  purposes of asynchronous communication across computer network systems between or  among individuals or groups, that is either  explicitly denoted as a system for electronic mail; or is implicitly used for such purposes.

   

The company encourages the use of electronic mail m ail and I t does not routinely inspect, respects the privacy of users. It monitor, or disclose electronic mail without the holder's consent. Nonetheless, subject to the requirements for  authorization and notification, the company may deny may ay inspect, access to its electronic mail services and m monitor, or disclose electronic mail when required by and consistent with law, when there is substantiated reason that violations of policy or law have taken place, or, in exceptional cases, when required to m meet eet time-dependent, critical operational needs. These provisions are forms s of  comparable to those of policies that apply to other form communications, such as conventiona conventionall mail.

   

CAUTIONS: Users should be aware of the following:

• 1.1 Both the nature nature of electron electronic ic mail and of of the company’s business makes electronic mail less private than users may anticipate. For example, electronic mail intended for one person sometimes may be widely distributed because of  the ease with which recipients can forward it to others. Furthermore, even after a user deletes an electronic mail record from a computer or  electronic mail account it may persist on backup facilities, and thus be subject to disclosure disc losure under  the provisions of public records law. The company cannot routinely protect users against

 

such eventualities

 

1.2 Electronic mail, whether or not created cr eated or  stored on company equipment, may constitute as stored on record. company equipment, may constitute subject ubject to full as company Thus, may be s disclosure if necessary   1.3 The company, in general, cannot and does not wish to be the arbiter of the contents of  electronic mail. Neither can the company, in general, protect users from receiving electronic mail they may find offensive. Employees, however, are strongly encouraged to use the same personal and professional courtesies and considerations in electronic mail as they would in other forms of  communication.

   

1.4 There is no guarantee, unless "authenticated" mail systems are in use, that electronic mail received was in fact fac t sent by the purported sender, since it is relatively straightforward, although it is defined as a violation v iolation in this Policy, electronic for senders to disguise their identity. Furthermore, mail that is forwarded may also be modified. Authentication technology is not widely and systematically in use in the company c ompany as of the date of this Policy. As with print documents, in case of doubt receivers of electronic mail messages should check with the purported sender  s ender  to validate authorship or authenticity  authenticity  

   

1. 1.5 5 Ther Th ere e wi will be oc occa casi sion ons s tha thatt IT IT pe pers rso onn nnel el and sy sys ste tem m administrators may, during the performance of their duties, inadvertently see the contents of email messages. inadvertently 1.6 1. 6 Exce Ex cept pt as pr prov ovid ided ed el else sewh wher ere e in th thiis Pol Polic icy, y, IT pe pers rson onne nell are not permitted to do so intentionally or disclose or otherwise use what they have seen. One exception, however, is that of  Systems Administrator who may need to inspect email when rerouting or disposing of otherwise undeliverable email. This exception is limited to the least invasive level of inspection required to perform such duties. Furthermore, this exception does notdisclosure exempt Systems Administrator from theinformation, prohibition against of personal and confidential except insofar as such disclosure equates with good faith attempts to route the otherwise undeliverable email to the intended recipient. Re-routed mail normally should be accompanied by notification to the recipient that the email has

been inspected for such purposes  purposes     

1.7 Even though the sender and recipient have discarded their copies of an electronic mail record, there may be back-up copies that can be retrieved. Systems may be "backed-up" on a routine r outine or  occasional basis to protect system reliability r eliability and integrity, and to prevent loss ofofdata. back-up process results potential in the copying data The onto c opying storage media that may be retained for periods of  time and in locations unknown to the originator or iginator or  recipient of electronic mail. The practice and frequency of back-ups and the retention of back-up back -up copies of email vary from system to system.

   

PURPOSE

   

This paper is aimed to: 2.1 Establish a policy for effective and way of  communication through the proper use of email. 2.2 Identify limitations and prohibitions in the use of company email facility. 2.3 Define new policy and procedures where existing do not specificallymail. address issues particularpolicies to the use of electronic 2.4 Minimize disruptions in the use of company’s electronic mail and other services and activities.

   

SCOPE

• This policy applies to all employees of  iWebmasters.com, Inc.

   

POLICY

   

1. Each user is subject to 50 megabytes quota space only. 2. Only IT personnel authorizedoftoiWeb. issue email account to eachisemployee 3. Each employee will only be provided with one email account, additional email account can be accommodated provided approved by IT Manager and COO. 4. Use of company email is limited to official use only. Use of company email for private business activities, personal activities, amusement/entertainment purposes, or other  non-job related communications is discouraged.

   

5. Email services may be used for incidental personal purposes provided that, in addition to the foregoing constraints and conditions, such use does not 5.1 Directly or indirectly interfere with the company’s operation of computing facilities or  electronic mail services; 5.2 Burden the company with noticeable incremental cost; 5.3 Interfere with the email user's employment or other obligations to the company. Email records arising from such personal use may, however, be subject to full disclosure under the presumption that such are company records

that such are company records  records     

such as MS Outlook maybe allowed provided approved by IT Manager and COO. 8. All email messages should be downloaded. No copy of messages will be stored in the email server. 9. Email accounts of resigned employees are automatically deleted on their last working day.

   

PENALTIES • Employees are accountable for their use of electronic communications just as they are for other conduct and communications in the workplace. Violations of policies governing the use of email may result in restriction of  access to the company’s computing access. In addition, Corrective Action may be applicable under the company’s com pany’s Code of Conduct specifically s pecifically the following provisions: • Article 1 Section 4.1 • • Article Article 1 1 Section Section 4.2 5.25 • Article 2 Section 2.19 • Article 2 Section 2.21 • Article 3 Section 1.1 • Article 3 Section 1.22

Article 3 Section 1.22    

In addition to the above existing provisions in our  Code of Conduct, the following will be added:

   

OFFENSES RELATED TO EMAIL USE   DESCRIPTION of OFFENSE • Theft or other abuse of  computing facilities. • Unauthorized entry, use, transfer, and tampering the accounts and files of with others • Interference with the work of  others and with other  computing facilities • Use of email for unlawful activities • Use of email commercial purposes not under the auspices of the company

TYPE of OFFENSE

C C

B C B

   

OFFENSES RELATED TO EMAIL USE   DESCRIPTION of OFFENSE

TYPE of OFFENSE



Use of email for personal financial gain (except as permitted under applicable policies)

C



Use of emailwith for personal inconsistent policies use regarding intellectual property, or regarding sexual or other  forms of harassment. Mis-representation. Giving the

B



impression that employee is representing, giving opinions, or otherwise making statements on behalf of the company unless appropriately authorized (explicitly or  implicitly) to do so

B

   

OFFENSES RELATED TO EMAIL USE   DESCRIPTION of OFFENSE • Failure to write an explicit disclaimer at the bottom of the email unless it is clear from the context that the author is not representing the company. An appropriate disclaimer is: “The opinions or statements expressed hereon are my own and should not be taken as a position, opinion, or endorsement of the company.

TYPE of OFFENSE

B

   

OFFENSES RELATED TO EMAIL USE   DESCRIPTION of OFFENSE •

• •



Use of email that will Interfere with the company’s email services that could reasonably be expected to cause, directly or indirectly, excessive strain on any computing facilities, or unwarranted or  unsolicited interference with others' use of email or email systems . Such uses include, but are not limited to, the use of email services to: i. Send or or forward forward email email chain letters; iiservers "Spam", is, to exploit list or that similar broadcast systems for purposes beyond their  intended scope to amplify the widespread distribution of  unsolicited email; Iii. “Letter-bomb", that is, to re-send the same email repeatedly to one or  more recipients to interfere with the

TYPE of OFFENSE

B

recipient s use of email.    

OFFENSES RELATED TO EMAIL USE   DESCRIPTION of OFFENSE • •



Excessive use of email for  Personal Use. Failure to exercise extreme caution in using email to communicate confidential sensitive matters. Failure to take necessary precautions to protect the confidentiality of personal or  confidential information encountered in the performance of their duties or  otherwise in the use of email facilities

TYPE of OFFENSE A B

B

   

EFFECTIVITY AND VALIDITY

• This policy paper shall take effect immediately after approval and should be reviewed annually or as need arises.

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close