E RADAR. All Rights Reserved. Acceptable Use Policy

Similar documents
The John Fisher School ICT Policy

Communication and Usage of Internet and Policy

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010

Acceptable Use Policy

Internet, , and Computer Usage Policy

This Policy applies to all staff and other authorised users in St Therese School.

Acceptable Use Policy (AUP)

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

REPORTING INFORMATION SECURITY INCIDENTS

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

ICT User Policy. for use in Essa Academy Essa Primary Academy Essa Nursery and Support Services

Acceptable Use Policy

LEGAL ASPECTS OF SOCIAL MEDIA

Acceptable Use Policy

ICT Acceptable Use Policy (AUP)

IT Acceptable Use Policy - Users

Acceptable Use Policy

Computer Use and File Sharing Policy

Acceptable Use Policy

Community Use Agreement

Acceptable Usage Policy (Student)

PCA Staff guide: Information Security Code of Practice (ISCoP)

Guest Wireless Policy

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.

Acceptable Use Policy

The Lee Wiggins Childcare Centre E-SAFETY, PHOTOGRAPHY and VIDEO POLICY

Electronic Network Acceptable Use Policy

UCL Policy on Electronic Mail ( )

Student Network, Computing & Software Usage Regulations Version th July 2006

Policy Use of Information and Communications Technology (ICT) Resources

General Terms and Conditions (GTCs)

PUPIL ICT ACCEPTABLE USE POLICY

13. Acceptable Use Policy

NATIONAL UNIVERSITY OF SINGAPORE COMPUTER CENTRE ACCEPTABLE USE POLICY FOR IT RESOURCES. VERSION 4.1 Oct 2013

Grand Avenue Primary and Nursery School ICT Data management. Contents

TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE

Computer Use Policy for Students and Alumni

USAGE POLICIES. is defamatory, offensive, abusive, indecent, obscene, or constitutes harassment;

TELEPHONE AND MOBILE USE POLICY

UWC International Data Protection Policy

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

MARSTON S PLC EMPLOYEE POLICIES & PROCEDURES GROUP I.T. TELEPHONE AND SOCIAL MEDIA POLICY

Terms and Conditions 01 January 2016

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

Responsible Officer Approved by

II.C.4. Policy: Southeastern Technical College Computer Use

Cognizant Careers Portal Terms of Use and Privacy Policy ( Policy )

Acceptable Use and Publishing Policy

CODE OF CONDUCT FOR INFORMATION TECHNOLOGY, COMPUTER, TELEPHONE AND EQUIPMENT USE

EA-ISP-009 Use of Computers Policy

PTLGateway Acceptable Use Policy

Cleveland State University General Policy for University Information and Technology Resources

SCOTTISH ENVIRONMENT PROTECTION AGENCY. Information Technology Acceptable Use Procedure. Final Version 5.10 Page 1 of 7

Xpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers;

LEARNER I.T. ACCEPTABLE USE POLICY. Learner I.T. Acceptable Use Policy [Type text] Updated November Authorised by ILT Board/Executive.

This policy should be read in conjunction with LEAP s Conflict of Interest Policy.

SeelogicMail Terms and Conditions

Service Specific Terms & Conditions

Synchrotron Light Source Australia Pty Ltd

2.1 Website means operated and owned by UCS Technology Services, including any page, part of element thereof;

The Safe and Sound Services are available for individuals aged 18 years or older.

Acceptable Use Policy

STUDENT ICT ACCEPTABLE USE POLICY

Reading School: ICT User Agreement Return Form (AUP)

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

WARNER PACIFIC COLLEGE

Acceptable Use Policy

IT Appropriate Use - Best Practice for Guidelines. Section 1 - Purpose / Objectives. Section 2 - Scope / Application. Section 3 - Definitions

A practical guide to IT security

Peaceful Pill Forum Rules

PS 176 Removable Media Policy

ICT Acceptable Use Policy

USE POLICY. iprimus.com.au

BISHOP GROSSETESTE UNIVERSITY. Document Administration. This policy applies to staff, students, and relevant data subjects

TERMS AND CONDITIONS

Computer Use Regulations

INFORMATION ASSET MANAGEMENT POLICY

ICT Acceptable Use Policy for Students

Leiden University Regulations on ICT and Internet Use. Version

Policy General Policy GP20

Schools Acceptable Use Policy

World Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018

Directive. on the Use of IT Resources at the University of Bern. For internal use. Classification. Released. Document status

Acceptable Use Policy

The purpose of this guidance is: To provide a comprehensive understanding to complying with the universities Acceptable Use Policy.

PGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES

Curtin IT Services ICT POLICY MANUAL. Version 4.0. Information Management

SMS SERVICE PROVISION

Name of Policy: Computer Use Policy

IT ACCEPTABLE USE POLICY

INFORMATION CODE OF CONDUCT

EMPLOYEE USE OF TECHNOLOGY AGREEMENT

ACCEPTABLE USE POLICY

Tularosa Communications, Inc. (TCI) General Service Terms and Conditions

Text and messaging - Safeguarding Guidelines

COMPUTER USE POLICY Staff

TIME OUT AND TIME OUT MARKET WEBSITE TERMS OF USE

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

IT SERVICES ICT Usage & Security Policy

Internet, , Social Networking, Mobile Device, and Electronic Communication Policy

Transcription:

Email Acceptable Use Policy

For further help, please contact support@eradar.eu Item Number LD 0002 Author E RADAR LIMITED Disclaimer This template is provided with the understanding that the publisher is not in the business of rendering legal or professional advice. Always consult with an appropriate professional before using the documents on this website. The publisher does not verify the accuracy or copyright ownership of documents that have been uploaded by third party contributors. Licence Attribution E RADAR licenses you to use this legal template for business and private purposes. This license lets you distribute, remix, tweak, and build upon our work, even commercially, as long as you credit us for the original creation. More about copyright licences Further information A selection of legal templates are available from E RADAR and our business partners. Visit the E RADAR website at www.eradar.eu for further information.

Overview A written Email Use Policy and the procedures behind it are designed to protect both employers and workers from any legal liabilities arising from the use of email at work. These might include employees opening attachments from an un recognised email which might contain a virus, or making racist and sexist comments via email. As an employer, you will also need to set out the boundaries between using email for work and private purposes. Another issue to consider is to ensure that employees who are not authorised to do so are making agreements via email. You ll also need to make sure that employees don t breach intellectual property laws or data protection by sending protected copyright images or personal data. The Email Use Policy must make it clear that disciplinary action can be taken if workers fail to comply with its requirements. You should also ensure that any agreements with third party contractors and consultants carry the same message. Please cut and paste the highlighted text below into your own document and insert the relevant information where indicated.

Email Acceptable Use Policy Use of email by employees of [Insert Business Name] is permitted and encouraged where such use supports the goals and objectives of the business. However, [Insert Business Name] has a policy for the use of email whereby the employee must ensure that they: comply with current legislation use email in an acceptable way do not create unnecessary business risk to the company by their misuse of the Internet Unacceptable behaviour use of company communications systems to set up personal businesses or send chain letters forwarding of company confidential messages to external locations distributing, disseminating or storing images, text or materials that might be considered indecent, pornographic, obscene or illegal distributing, disseminating or storing images, text or materials that might be considered discriminatory, offensive or abusive, in that the context is a personal attack, sexist or racist, or might be considered as harassment accessing copyrighted information in a way that violates the copyright breaking into the company s or another organisation s system or unauthorised use of a password/mailbox broadcasting unsolicited personal views on social, political, religious or other non business related matters transmitting unsolicited commercial or advertising material undertaking deliberate activities that waste staff effort or networked resources introducing any form of computer virus or malware into the corporate network Monitoring [Insert Business Name] accepts that the use of email is a valuable business tool. However, misuse of this facility can have a negative impact upon employee productivity and the reputation of the business. In addition, all of the company s email resources are provided for business purposes. Therefore, the company maintains the right to examine any systems and inspect any data recorded in those systems. In order to ensure compliance with this policy, the company also reserves the right to use monitoring software in order to check upon the use and content of emails. Such monitoring is for legitimate purposes only and will be undertaken

in accordance with a procedure agreed with employees. Sanctions Where it is believed that an employee has failed to comply with this policy, they will face the company's disciplinary procedure. If the employee is found to have breached the policy, they will face a disciplinary penalty ranging from a verbal warning to dismissal. The actual penalty applied will depend on factors such as the seriousness of the breach and the employee's disciplinary record. Note: [These procedures will be specific to your business. They should reflect your normal operational and disciplinary processes. You should establish them from the outset and include them in your acceptable use policy.] Agreement All company employees, contractors or temporary staff who have been granted the right to use the company s email system are required to sign this agreement confirming their understanding and acceptance of this policy. Updated April 2014 Price 10