IT And Communications Systems Policy
-
ABOUT THIS POLICY
- Our IT and communications systems are intended to promote effective communication and working practices. This policy outlines the standards you must observe when using these systems, when we will monitor their use, and the action we will take if you breach these standards.
- The Managing Director has overall responsibility for this policy, including keeping it under review.
- Breach of this policy may be dealt with under our Disciplinary Procedure and, in serious cases, may be treated as gross misconduct leading to summary dismissal.
- This policy does not form part of any employee’s or worker’s contract of employment or engagement and we may amend it at any time.
- Agency workers working on client sites and/or using client’s own IT and communications systems should familiarize themselves and comply with the client’s own corresponding applicable policies.
-
EQUIPMENT SECURITY AND PASSWORDS
- You are responsible for the security of the equipment allocated to or used by you, and you must not allow it to be used by anyone other than in accordance with this policy. You should use passwords on all IT equipment, particularly items that you take out of the office. You should keep your passwords confidential and change them regularly.
- You must only log on to our systems using your own username and password. You must not use another person’s username and password or allow anyone else to log on using your username and password.
- If you are away from your desk you should log out or lock your computer. You must log out and shut down your computer at the end of each working day.
-
SYSTEMS AND DATA SECURITY
- You should not delete, destroy or modify existing systems, programs, information or data (except as authorised in the proper performance of your duties).
- You must not download or install software from external sources without authorisation from [POSITION]. Downloading unauthorised software may interfere with our systems and may introduce viruses or other malware.
- You must not attach any device or equipment including mobile phones, tablet computers or USB storage devices to our systems without authorisation from your manager.
- We monitor all e-mails passing through our system for viruses. You should exercise particular caution when opening unsolicited e-mails from unknown sources. If an e-mail looks suspicious do not reply to it, open any attachments or click any links in it.
- Inform your manager immediately if you suspect your computer may have a virus.
-
E-MAIL
- Adopt a professional tone and observe appropriate etiquette when communicating with third parties by e-mail. You should also include our standard e-mail signature and disclaimer.
- Remember that e-mails can be used in legal proceedings and that even deleted e-mails may remain on the system and be capable of being retrieved.
- You must not send abusive, obscene, discriminatory, racist, harassing, derogatory, defamatory, pornographic or otherwise inappropriate e-mails.
- You should not:
- send or forward private e-mails at work which you would not want a third party to read;
- send or forward chain mail, junk mail, cartoons, jokes or gossip;
- contribute to system congestion by sending trivial messages or unnecessarily copying or forwarding e-mails to others who do not have a real need to receive them; or
- send messages from another person’s e-mail address (unless authorised) or under an assumed name.
- Do not use your own personal e-mail account to send or receive e-mail for the purposes of our business. Only use the e-mail account we have provided for you.
- We do not permit access to web-based personal e-mail such as Gmail or Hotmail on our computer systems at any time due to additional security risks.
-
USING THE INTERNET
- Internet access is provided solely for business purposes. Occasional personal use may be permitted as set out in Paragraph 6.
- You should not access any web page or download any image or other file from the internet which could be regarded as illegal, offensive, in bad taste or immoral. Even web content that is legal in the UK may be in sufficient bad taste to fall within this prohibition. As a general rule, if any person (whether intended to view the page or not) might be offended by the contents of a page, or if the fact that our software has accessed the page or file might be a source of embarrassment if made public, then viewing it will be a breach of this policy.
- We may block or restrict access to some websites at our discretion.
-
PERSONAL USE OF OUR SYSTEMS
- We permit the incidental use of our systems to send personal e-mail, browse the internet and make personal telephone calls subject to certain conditions. Personal use is a privilege and not a right. It must not be overused or abused. We may withdraw permission for it at any time or restrict access at our discretion.
- Personal use must meet the following conditions:
- it must be minimal and take place exclusively outside of normal working hours (that is, during your lunch break, and before or after work);
- personal e-mails should be labelled “personal” in the subject header;
- it must not affect your work or interfere with the business;
- it must not commit us to any marginal costs; and
- it must comply with our policies including the Equal Opportunities Policy, Anti-harassment and Bullying Policy, Data Protection Policy and Disciplinary Procedure.
-
MONITORING
- Our systems enable us to monitor telephone, e-mail, voicemail, internet and other communications. For business reasons, and in order to carry out legal obligations in our role as an employer, your use of our systems including the telephone and computer systems (including any personal use) may be continually monitored by automated software or otherwise.
- We reserve the right to retrieve the contents of e-mail messages or check internet usage (including pages visited and searches made) as reasonably necessary in the interests of the business, including for the following purposes (this list is not exhaustive):
- to monitor whether the use of the e-mail system or the internet is legitimate and in accordance with this policy;
- to find lost messages or to retrieve messages lost due to computer failure;
- to assist in the investigation of alleged wrongdoing; or
- to comply with any legal obligation.
-
PROHIBITED USE OF OUR SYSTEMS
- Misuse or excessive personal use of our telephone or e-mail system or inappropriate internet use will be dealt with under our Disciplinary Procedure. Misuse of the internet can in some cases be a criminal offence.
- Creating, viewing, accessing, transmitting or downloading any of the following material will usually amount to gross misconduct (this list is not exhaustive):
- pornographic material (that is, writing, pictures, films and video clips of a sexually explicit or arousing nature);
- offensive, obscene, or criminal material or material which is liable to cause embarrassment to us or to our clients;
- false and defamatory statement about any person or organisation;
- material which is discriminatory, offensive, derogatory or may cause embarrassment to others (including material which breaches our Equal Opportunities Policy or our Anti-harassment and Bullying Policy);
- confidential information about us or any of our staff or clients (except as authorised in the proper performance of your duties);
- unauthorised software;
- any other statement which is likely to create any criminal or civil liability (for you or us); or
- music or video files or other material in breach of copyright.