Employee Internet Usage Policy
As part of this organization'scommitment to the utilization of new technologies, many/all of our employeeshave access to the Internet. In order to ensure compliance with the copyrightlaw, and protect us from being victimized by the threat of viruses or hackinginto our server, the following is effective immediately:
It is (Organization's) policy tolimit Internet access to official business. Employees are authorized toaccess the Internet for personal business after-hours, in strict compliancewith the other terms of this policy. The introduction of viruses, ormalicious tampering with any computer system, is expressly prohibited. Anysuch activity will immediately result in termination of employment.
Employees using (Organization's)accounts are acting as representatives of (Organization). As such, employeesshould act accordingly to avoid damaging the reputation of the organization.
Files that are downloaded from theInternet must be scanned with virus detection software before installing orexecution. All appropriate precautions should be taken to detect for a virusand, if necessary, to prevent its spread.
The truth or accuracy of informationon the Internet and in e-mailshould be considered suspect until confirmed by a separate (reliable)source.
Employees shall not place companymaterial (copyrighted software, internal correspondence, etc.) on anypublicly accessible Internet computer without proper permission.
Alternate Internet Service Providerconnections to (Organization's) internal network are not permitted unlessexpressly authorized and properly protected by a firewall or otherappropriate security device(s).
The Internet does not guarantee theprivacy and confidentiality of information. Sensitive material transferredover the Internet may be at risk of detection by a third party. Employeesmust exercise caution and care when transferring such material in any form.
Unless otherwise noted, all softwareon the Internet should be considered copyrighted work. Therefore, employeesare prohibited from downloading software and/or modifying any such fileswithout permission from the copyright holder.
Any infringing activity by anemployee may be the responsibility of the organization. Therefore, thisorganization may choose to hold the employee liable for the employee'sactions.
This organization reserves the rightto inspect an employee's computer system for violations of this policy.
I have read (organization's)anti-piracy statement and agree to abide by it as consideration for my continuedemployment by (organization). I understand that violation of any above policiesmay result in my termination.
SOURCE: Software &Information Industry Association (SIIA), SPA Anti-Piracy Division.
Reprinted with permission of E-PolicyHandbook: How to Develop Computer, E-mil, and Internet Guidelines to ProtectYour Company and its Assets by Nancy L. Flynn, published by AMACONBooks. All rights reserved.
|The information contained here is intended toprovide useful information on the topic covered, but should not beconstrued as legal advice or a legal opinion.|