Page 30 - EE_Handbook__Final_Classical
P. 30
Together, we prepare people for work.
• The email system and other technical resources owned by GESMN are not to be used to
create offensive messages and must not contain profane, vulgar, harassing, or defamatory
statements.
• Internet users have a responsibility to use the internet appropriately in conducting GESMN
business. Examples of inappropriate use:
o Illegally downloading files.
o Sending threatening or harassing messages or files.
o Accessing sites with offensive or illegal content.
o Streaming or downloading multi-media such as YouTube or Pandora for non- business
use.
o Attempting to access a computer system without authorization.
o Using company time and resources for personal gain.
NETWORK/COMPUTER SECURITY GUIDELINES
• Access files, data, or other information appropriately.
• Keep all accounts and passwords confidential (e.g., do not write them down, make sure they
are not easily identified, such as using your child’s name and make them as complicated as
possible by using a variety of characters).
• Change your passwords on a regular basis.
• Access and store credit card and other sensitive information in ways which meet PCI
compliance regulations.
• Be aware that all electronic mobile devices which access GESMN information, whether
personal or owned by GESMN, are subject to electronic security policies, up to and including
complete remote data deletion. Employees are responsible for backing up data on their
mobile devices.
Employees have no reasonable expectation of privacy when using GESMN property. GESMN and its
technology partners reserve the right to monitor all employee email, voicemail, and/or internet usage to
ensure compliance with this policy. GESMN may also access and/or disclose email messages or files of
any employee to protect system security, fulfill organization obligations, detect employee wrongdoing,
comply with legal processes, or protect the organization's rights or property.
Violations of this policy may result in disciplinary action, up to and including termination of employment.
It is permissible to use computers, email, and the internet for incidental personal purposes during an
employee’s non-working time.
For more information, see Acceptable Use of Information Technology Resources (A-011), Privacy and
Business Confidentiality (A-009), Privacy Program (C-305), or Information Security (C-306) in the Policies
and Procedures section on the organization’s intranet.
SOCIAL MEDIA
GESMN – Internal Use Human Resources 27