Page 15 - Sample Employee Handbook.doc
P. 15

Compensation increases are given by the Consortium at its discretion in consideration of various factors, including
               your performance review.

               Progress towards goals will be reviewed quarterly with your immediate supervisor. Goals are set at the beginning
               of your employment in a meeting with your immediate supervisor within the first fourteen (14) days of hire.


               Internet Access


               Access to the Internet at the Consortium office is principally for work-related activities or approved
               educational/training activities. Incidental and occasional personal use and study use is permitted. This privilege
               should not be abused and must not affect the employee’s performance of employment-related activities.


               During core work hours working remotely, your internet connection should be used for the following reasons:


                   ●  To complete your job duties.
                   ●  To seek out information that you can use to improve your work.

                   ●  To access your social media accounts, while conforming to our social media policy.


               The Consortium does not want to restrict employee access to websites of their choice, but we expect our
               employees to exercise good judgement and remain productive at work while using the internet.


               Employees should:


                   ●  Keep their passwords secret at all times.
                   ●  Log into their corporate accounts only from safe devices.

                   ●  Use strong passwords to log into work-related websites and services.


               What is inappropriate employee internet usage?


               While working remotely during core business hours, you should not use your internet to:

                   ●  Download or upload obscene, offensive or illegal material.

                   ●  Send confidential information to unauthorized recipients.

                   ●  Invade another person’s privacy and sensitive information.
                   ●  Download or upload movies, music and other copyrighted material and software.

                   ●  Visit potentially dangerous websites that can compromise the safety of our cloud network and computers.

                                       For Internal Use Only -- Not For External Distribution

                                                             15
   10   11   12   13   14   15   16   17   18   19   20