Page 87 - Foltz Trucking Driver Handbook
P. 87

As a condition of use of Company resources, all users must agree to:
License Agreements
All employees must abide by the license agreement between the proprietor of the software and the Company. The improper reproduction of proprietary software by any means is prohibited.
All employees must use only proprietary software that is the property of the Company on any computing devices of the Company or on personal computing devices used for Company business unless specific authorization to use proprietary software not owned by the Company has been obtained in advance.
Security
Proprietary Software
Employees must safeguard the security of the Company's computer resources by following all security provisions introduced by the Company, including using virus-detection software and strictly adhering to the following measures set by the Company regarding required verification of the identity and validity of external messages and documents prior to opening them:
1. Never open unexpected e-mail attachments, even from co-workers.
2. Never open an e-mail or instant messaging attachment from an unknown or suspicious source. 3. Never download freeware or shareware from the Internet without express permission.
4. If a file you receive contains macros that you are unsure about, disable the macros.
5. Report all suspicious e-mails or files and do not open them. If the file is on storage media remove the media from the system.
6. Do not disable the antivirus program on your assigned computer.
7. Do not open any junk e-mail. This includes all chain e-mail and unsolicited advertising or spam.
Nenvork Access
Employees must access the Company's computer system or network only as authorized with the employee's authorized user ID and password. Employees also must access only those files which they have obtained' authorization to access or review.
Company Monitoring of Information
The Company may in its sole discretion periodically review, audit, intercept, access and disclose messages or other information created, received or sent over the communications resources for any purpose. The Company may disclose the contents of any information or message obtained as the result of an authorized review of employee use of communications resources without the permission of the employee. As a condition of initial and continued employment, all employees consent to Company review and disclosure of e-mail messages, voice mail messages, Internet records and computer files.
Confidentiality of Messages and Information
The confidentiality of any message should not be assumed. Even when a message is deleted, it is still possible to retrieve and read that message. Further, the use of passwords for security does not guarantee confidentiality. Log-onandotherpasswordsshouldnotbeshared,unlesssuchshareduseisnecessaryand authorized for the efficient operation of the Company.
Misuse of Communications Resources
Use of the Company's communications resources in violation of this policy may result in disciplinary action, up to and including termination of employment.
Personal use of telephones for long-distance and local use is strongly discouraged. Incoming phone messages for employees will be taken unless it is an emergency. All personal calls should be made during break time. Employees should practice discretion in using company telephones when making personal calls. Employees may be required to reimburse the Company for any charges resulting from their personal use.
   Use of Phone and Fax System
 Page 22











































































   85   86   87   88   89