ELECTRONIC MAIL POLICY

Similar documents
Acceptable Use Policy

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9

University Policies and Procedures ELECTRONIC MAIL POLICY

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

II.C.4. Policy: Southeastern Technical College Computer Use

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.

ACCEPTABLE USE OF HCHD INTERNET AND SYSTEM

Wireless Communication Device Policy Policy No September 2, Standard. Practice

Acceptable Use Policy

Cleveland State University General Policy for University Information and Technology Resources

Computer Use and File Sharing Policy

Acceptable Use Policy

Electronic Network Acceptable Use Policy

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

Policies & Regulations

Communication and Usage of Internet and Policy

Acceptable Use Policy

Acceptable Use Policy

Internet, , and Computer Usage Policy

TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

ACCEPTABLE USE ISO INFORMATION SECURITY POLICY. Author: Owner: Organisation: Document No: Version No: 1.0 Date: 10 th January 2010

Springfield, Illinois Police Department

EMPLOYEE USE OF TECHNOLOGY AGREEMENT

Staff Information System Acceptable Use Policy

FERPA & Student Data Communication Systems

POLICY BURLINGTON TOWNSHIP BOARD OF EDUCATION. PROGRAM 2361/page 1 of 8 Acceptable Use of Computer Network/Computers and Resources M

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

Internet, , Social Networking, Mobile Device, and Electronic Communication Policy

UCL Policy on Electronic Mail ( )

This Policy applies to all staff and other authorised users in St Therese School.

LifeWays Operating Procedures

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

Acceptable Use Policy. Effective January 2017

Cognizant Careers Portal Terms of Use and Privacy Policy ( Policy )

Horry County IT /GIS Policy Acce table Use Com uter S stems

TITLE SOCIAL MEDIA AND COLLABORATION POLICY

IT Appropriate Use - Best Practice for Guidelines. Section 1 - Purpose / Objectives. Section 2 - Scope / Application. Section 3 - Definitions

13. Acceptable Use Policy

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

Acceptable Use Policy

Domino s Pizza Enterprises Ltd. The Business Partner. Code of Practice

BERKELEY COLLEGE Social Media Policy

Brazosport Independent School District Employee/Agent Acceptable Use Agreement For Internet/Network Access and Use

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

Auckland District SUPPORT SERVICES Board Policy Health Board (Section 7) Manual ELECTRONIC MAIL

Acceptable Use Policy

Usage Policy Document Number: OIL-IS-POL-EU

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

Supersedes Policy previously approved by TBM

Red Flags/Identity Theft Prevention Policy: Purpose

IT ACCEPTABLE USE POLICY

TOLEDO. Approving Officer: President. Responsible Agent: Vice President, CIO/CTO. Scope: All University organizational units

ADMINISTRATIVE POLICY NO ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads)

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

GM Information Security Controls

NHS Ayrshire & Arran Organisation & Human Resource Development Policy. Appropriate Use of IT Facilities Policy

Policy Summary: This guidance outlines ACAOM s policy and procedures for managing documents. Table of Contents

Columbine Knolls South/Estates Policy

Commonwealth of Pennsylvania Governor's Office

COMPUTER USAGE AND SECURITY POLICY

Information Technology Acceptable Use Policy

ACCEPTABLE USE OF INFORMATION SYSTEMS

Synchrotron Light Source Australia Pty Ltd

Domino s Pizza Enterprises Ltd. The Business Partner. Code of Practice

FreedomNet Solutions Acceptable Use Policy ( )

POLICIES AND PROCEDURES

Data Protection Policy

19 Dec The forwarding and returning obligation does not concern messages containing malware or spam.

UWC International Data Protection Policy

You may contact The Translation Network by at You may also call The Translation Network at

DIRECTIVE ON RECORDS AND INFORMATION MANAGEMENT (RIM) January 12, 2018

Employee Security Awareness Training Program

Northern Virginia Community College Social Media Guidelines

Guest Wireless Policy

PURPOSE: To establish policies and procedures for the use of University-owned and -operated information technology resources.

EMPLOYEE COMPUTER, , AND INTERNET USAGE POLICY

Information Security Policy

Within the meanings of applicable data protection law (in particular EU Regulation 2016/679, the GDPR ):

State of New Mexico Public School Facilities Authority Information Technology (IT) Acceptable Use Policy

ACCEPTABLE USE POLICY

GENERAL ORDER PORT WASHINGTON POLICE DEPARTMENT

Any reference in the Term to you or your means you as a user of the Website.

Each member of the St. Margaret s Community has the privilege to access Google Apps provided by the school s network

PGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES

Web Provision & Conduct Policy

NORTH CAROLINA AGRICULTURAL AND TECHNICAL STATE UNIVERSITY

Grove Country Day School aka Academ y Acceptable Use Policy (AUP)

Internet and Policy

Management: A Guide For Harvard Administrators

Acceptable Use Policy (AUP)

Data Processing Agreement

1 Privacy Statement INDEX

Information Security Management System ISO/IEC 27001:2013

SPRING-FORD AREA SCHOOL DISTRICT

Use of and Instant Messaging (IM) Policy

ICT Acceptable Use Policy (AUP)

UTAH VALLEY UNIVERSITY Policies and Procedures

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Transcription:

m acta I. PURPOSE The Information Systems (IS) Department is responsible for development and maintenance of this policy. The Finance and Administration Division is responsible for publishing and distributing this policy. Each employee is responsible for exercising good business judgment in their use of Orange County Transportation Authority (OCTA) provided electronic mail services. II. III. ORGANIZATIONAL UNITS AFFECTED This policy applies to all OCT A employees. POLICY It is the policy of OCTA that electronic messaging systems, including but not limited to, e-mail and instant messaging are to be used for business purposes. E-mails are subject to the Public Records Act; and therefore, subject to disclosure to the public. IV. DEFINITIONS Not applicable. V. PROCEDURE A. OCT A provides electronic messaging resources to assist in conducting OCT A business. B. All messages composed, sent or received by any person using OCTA provided equipment are stored in the company provided electronic messaging systems, and are the sole property of OCT A. C. Upon separation from OCTA, all access to electronic messaging resources, including the ability to download, forward, print or retrieve any message stored in the system, regardless of sender or recipient will be denied. D. If deemed necessary for business needs, an employee will be assigned a unique e-mail address that is to be used while conducting OCTA business via e-mail. E-mail signature blocks may only contain pertinent sender contact information. Phrases, quotes, graphics and displays above and below the signature block are not an allowable practice at OCT A. FA-IS-380.0SELECMAIL CEO.doem (12/14/10) Page 1 of S

Policy#: EO-IS-380.05ELECMAIL Origination Date: 08/17/1994 Revised Date: 10/13/2010 E. OCTA reserves the right to intercept, monitor, review and/or disclose any and all messages composed, sent or received by OCTA property. The interception, monitoring and reviewing of messages may be performed with the assistance of content filtering software, or by designated company employees and/or designated external entities. Employees designated to review messages may include, but are not limited to, Mail Administrator, an employee's supervisor or manager and/or representatives from Human Resources, Labor/Employee Relations, legal counsel, and Internal Audit. F. OCTA reserves the right to alter, modify, re-route or block the delivery of messages as appropriate. G. The unique e-mail addresses and/or instant messaging identifiers assigned to an employee are the property of OCT A. Employees may use these identifiers only while employed by OCTA. The right to use these identifiers terminates upon separation from OCT A service. H. Employees are prohibited from disabling anti-virus software running on OCTA provided computer equipment. I. OCT A sets a global mailbox size on all OCTA mailboxes. It is the responsibility of each employee to perform regular housekeeping of their mailboxes. J. OCTA employs certain practices and procedures in order to maintain the health and efficiency of electronic messaging resources, to achieve OCTA business objectives and to meet various regulations. 1. OCTA treats electronic messages as a business record. As with any business record, established practices and procedures for the safekeeping, retention, and ultimate destruction of the business record must be followed. 2. OCTA archives and retains copies of all internal and external electronic messages on a daily basis. 3. Electronic mail generates correspondence, some of which may be official records in need of protection/retention. It is the responsibility of staff to determine if an e-mail message is covered within the scope of a record series on their department records retention schedule. It is also the responsibility of the department staff to provide appropriate storage arrangement for any messages which must be retained. Retention of records can occur by printing out the message or moving the message to an external storage file. K. While electronic messaging resources allow employees to conduct company business efficiently, use of e-mail comes with some inherent risks. All employees should be aware of these risks and take precautions as well as exercise good business judgment to mitigate them: FA-IS-380.0SELECMAIL CEO.doem (12114/10) Page 2 of S

1. Electronic messages are legally discoverable and permissible as evidence in a court of law. 2. Messages sent electronically can be intercepted inside or outside OCTA and as such there should never be an expectation of confidentiality. Do not disclose proprietary or confidential information through e-mail messages. Confidential messages should be communicated in person and in private, and adhere to any and all policies and procedures which may apply. 3. Use caution and good business judgment in determining whether a message should be delivered electronically instead of in person. Time sensitive communications such as requests for services which require immediate attention should be tendered in person or through other verifiable means. There is not provision within the e-mail system for guaranteeing that a time sensitive message will be read by the intended receiver in a timely manner. 4. Electronic messages are frequently inadequate in conveying mood and context. Use good business judgment to carefully consider how the recipient might interpret a message before composing or sending it. Employees should always compose their messages in a courteous and respectful manner. Language which is insulting, offensive, disrespectful, demeaning, or sexually suggestive, or which contains sexual or ethnic slurs, obscenities or any representation of obscenities, could constitute harassment and will not be tolerated. 5. Even though OCTA employs up to date anti-virus software, some virus infected messages may enter OCT A's messaging systems. Viruses, "worms" and other malicious code can spread quickly if appropriate precautions are not taken: a. Be suspicious of messages sent by people not known by you. b. Do not open attachments unless they were anticipated by you. c. Disable features in electronic messaging programs that automatically preview messages before opening them. 6. Chain letters should be deleted, not forwarded. 7. OCTA considers unsolicited commercial e-mail (spam) a nuisance and potential security risk. Do not attempt to remove yourself from future delivery of a message that you determine is spam. These "Remove Me" links often are authors of spam as a means to verify active e-mail accounts. Attempting to remove an e-mail address may result in increased spam. If you receive such spam repeatedly, please contact the IS Help Desk. 8. Internet message boards can be a source from which mass junk e-mailers harvest e-mail addresses and e-mail domains. Do not use OCTA provided e-mail addresses when posting to message boards or non-related business sites. FA-IS-380.0SELECMAIL CEO.doem (12/14/10) Page 3 of 5

9. Training on the electronic messaging system is administered jointly by the IS Department and the Training Department. An initial, brief training on the system is presented to new employees during their orientation session. Thereafter, regular training classes are offered to all employees on the electronic messaging system in line with the acta Training Program. 10. For the purposes of this policy, which is applicable to all acta employees, a global message is defined as any message which is distributed to all employees who are on the OCTAin Network. 11. All electronic mail messages are official acta records. Therefore, messages disbursed through the global option of the electronic messaging system should be those which are involved in acta business activities or contain information - essential to all acta employees. 12. The use of the global messaging option on electronic mail is restricted, but not limited to the following: a. Communications from the CEO b. Administrative communications; any business related events, changes, or projects which will have an impact on groups of acta employees or which the employees should be informed of, including: (1) Policy or procedural changes or additions/deletions that affect all acta employees (2) acta business actions which affect all acta employees (3) Regular or special meetings intended for all employees (4) Employee security (5) Human Resources communications relaying specific information about employee benefits such as deferred benefits, retirement benefits, or health care benefits as approved by the Executive Director of Finance and Administration. (6) Information systems communication (7) Communications including but not limited to training, global equipment downtime, virus warnings and network maintenance (8) Announcements about new hires and promotions c. Any messages which do not fall into these categories may not be disbursed through the global messaging option, unless approved by the requesting Executive Director. d. Global messages will only be distributed by the Executive Director approved departmental staff or by the IS Help Desk. FA IS-380.05ELECMAIL CEO.doem (12/14/10) Page 4 015

Policy#: EO-IS-380.05ELECMAIL Origination Date: 08/17/1994 Revised Date: 10/13/2010 VI. EXCEPTIONS OCTA reserves the right to revise this policy, at any time, including its practices and process. Policy revisions shall be disseminated to all affected employees upon approval of the Chief r. Electronic mail is provided for the purpose of conducting OCTA business. Subject to the restrictions in this policy and if permitted by the employee's supervisor, some occasional and limited personal use of electronic messaging is allowed so long as it does not interfere with the performance of the employee's OCT A duties and does not result in any additional expense to OCT A. However, electronic mail shall not be used for email chain letters, for religious or political advocacy, for excessive personal communications, for personal financial gain, to seek outside employment, for any purpose that could reasonably be viewed as abusive, harassing, hostile or intimidating to OCTA customers or employees, to access entertainment or sexually explicit sites, or for any use otherwise prohibited by law. OCTA reserves the right to monitor and review all records of usage by OCT A employees of any OCT A assets. No use of OCT A electronic mail, or use of any other OCTA asset shall be private to the employee, and no OCTA employee shall be given any basis for an expectation of privacy in any such use. VII. PROVISIONS AND CONDITIONS A. OCTA prohibits discrimination based on age, race, gender, sexual orientation, religion or other protected status. Use of electronic messaging resources to discriminate for any or all of the aforementioned reasons is prohibited. B. Any employee who discovers a violation of this policy should immediately notify a supervisor or manager. C. Any employee in violation of this policy is subject to disciplinary action, up to an including, termination. VIII. RELATED DOCUMENTS Not applicable. END OF POLICY FA-IS-380.05ELECMAIL CEO.doem (12/14/10) Page 5 015