Employee Computer Use Policies

   If you are an employer or supervisor, it's important that your employee manual set forth clear rules for the use of company computers and the types of websites that may be accessed from your office or company laptops regardless of the location.

Here are some examples that you may want to adapt to your circumstances:

Telephone and Computer Use Policy

The Company understands that when employees work during the week it is occasionally necessary to conduct personal business during office hours. However, employees should limit their personal use of the telephone and computer during office hours. Talk to your manager if you have any questions as to how much is too much time. Because telephone and e-mail systems are provided by the Company at its expense for business use, all messages sent by or received on those systems are company documents. The Company reserves the right to access and to disclose the messages that you send or receive on the voice mail or e-mail systems. Employees should also be aware that “deleted” messages from the computer screen may not actually be deleted fro the e-mail system. Employees who abuse this policy are subject to disciplinary procedures up to and including discharge.

Computer and Internet Use Policy

The Company promotes Internet use that enables employees to perform Company missions and encourages its employees, volunteers, and contractor personnel to develop Internet skills and knowledge. If an employee's supervisor determines that Internet access is in the best interest of the Company, the employee will be permitted, within the limits set forth below, to use the Internet on personal time to build his/her network search and retrieval skills. Employees who do not require access to the Internet as part of their official duties, may not access the Internet using Company facilities under any circumstances. It is expected that employees will use the Internet to improve their job knowledge; to access scientific, technical, and other information on topics which have relevance to the Company; and to communicate with their peers in other companies. Users should be aware that when access is accomplished using Internet addresses and domain names registered to the Company, they may be perceived by others to represent the Company. Users are advised not to use the Internet for any purpose which would reflect negatively on the Company or its employees.

Company computer systems are for Company use and not for personal use; however, when certain criteria are met, Company users are permitted to engage in the following activities:

1. During working hours, access job-related information, as needed, to meet the requirements of their jobs.
2. During working hours, participate in news groups, chat sessions, and E-mail discussion groups (list servers), provided these sessions have a direct relationship to the user's job with the Company. If personal opinions are expressed, a disclaimer should be included stating that this is not an official position of the Company.
3. During personal time, retrieve non-job-related text and graphics information to develop or enhance Internet-related skills if the office pays a fixed rate for Internet access; that is, the access charge is usage insensitive and if a dial-up connection is made to an Internet access provider it must be within the local calling areas. It is expected that these skills will be used to improve the accomplishment of job-related work assignments. This policy of allowing employees to use Internet resources during non-work periods is similar to the policy of allowing staff to use library resources on personal time. The use of both types of resources enhances the employee’s knowledge and skill in information retrieval, benefits which immediately translate to his or her ability to perform work-related activities. By encouraging employees to explore the Internet, the Company also builds its pool of Internet-literate staff who can then guide and encourage other employees.
4. Employees are prohibited from initiating non-work-related Internet sessions using Company information resources from remote locations. That is, employees shall not dial into or connect to Company resources from home or other non-Company locations for the purpose of participating in non-job-related Internet activities.

The following uses of the Internet, either during working hours or personal time, using Company equipment or facilities, are not allowed:

1. Access, retrieve, or print text and graphics information which exceeds the bounds of generally accepted standards of good taste and ethics.
2. Engage in any unlawful activities or any other activities which would in any way bring discredit on the Company.
3. Engage in personal commercial activities on the Internet, including offering services or merchandise for sale or ordering services or merchandise from on-line vendors.
4. Engage in any activity which would compromise the security of any Company host computer. Host log-in passwords will not be disclosed or shared with other users.

Internet and Computer Use Policy

The Company provides technology, networks and Internet services for the specific and limited purpose of achieving the Company’s goals and accomplishing its purposes. All other activities are prohibited. Company technology, networks and Internet services remain at all times the property of the Company.
Use of Company technology, networks, and Internet services does not create any expectation of privacy. The Company reserves the right to search and/or monitor any information created, accessed, sent, received, and/or stored in any format by any Company employee on Company equipment or any equipment connected to the Company’s network.
Passwords, which allow access to networks, data, and hardware, need to be protected at all times.
Employees are not to disclose confidential information to unauthorized individuals.
Users may encounter material they interpret as controversial, inappropriate, or offensive. It is impossible to completely define such the content. It is the users responsibility not to access such material using Company's technology of any kind.
The following are examples of inappropriate uses that are prohibited:
Anything prohibited by law.
Activities that would subject the Company or the individual to criminal, civil or administrative liability
Using another person’s password or distributing another person’s password
Accessing another person’s computer, folders, work, or files without their consent
Harassing, insulting or attacking others.
Using the Company's equipment or network for commercial purposes
Violating copyright laws
Sending or displaying intimidating, hostile, offensive, or hate related material
Using obscene language or intentionally accessing or possessing obscene or pornographic material, as defined in subdivision (a) of California Penal Code Section 313, or similar laws in your location.
Possession or use of any tools designed for probing, monitoring, or breaching the security of the network or infecting the network with a virus
Using the network for non-Company related bandwidth intensive activities such as network games and the downloading of music or video files or serving as a host for such activities
Using Company equipment for non-Company related purposes
Advertising or promoting non-Company commercial endeavors
Participating in non-Company approved forums, chat rooms, or exchanges

Employees in violation of this Policy will be subject to disciplinary action up to and including dismissal.
I have read, understand, and agree to comply with, the above stated Company policy.

Business Computer Monitoring Software