Page 36 - CBI and Williams
P. 36

USE OF CLIENT PROPERTY, EQUIPMENT, INTERNET AND ELECTRONIC
               COMMUNICATIONS SYSTEMS


               EMAIL

               Email messages, including attachments, sent and received on our or a client’s equipment
               belong to us or the client, respectively.  We and/or the client reserve the right to access,
               monitor, read, and/or copy email messages at any time, for any reason.  This includes messages
               considered to be personal or labeled with a designation such as “Personal” or “Private” if sent

               and received on our or client equipment.

               ALL CONDUCT RULES APPLY TO EMAIL

               All of our policies and rules of conduct apply to employee use of the email system. This means,
               for example, that you may not use the email system to send harassing or discriminatory
               messages, including messages with explicit sexual content or pornographic images; to send
               threatening messages; or to reveal our or the client’s trade secrets or confidential information.


               PROFESSIONAL TONE AND CONTENT

               We expect you to exercise discretion in using electronic communications equipment. When you
               send email using communications equipment meant for conducting business, you are
               representing us and/or the client. Make sure that your messages are professional and
               appropriate, in tone and content. Remember, although email may seem like a private
               conversation, email can be printed, saved, and forwarded to unintended recipients. You should
               not send any email that you wouldn’t want your boss, your mother, us or the client’s
               competitors to read.


               EMAIL SECURITY

               To avoid email viruses and other threats, you should not open email attachments from people
               and businesses that you don’t recognize, particularly if the email appears to have been
               forwarded multiple times or has a nonexistent or peculiar subject heading. Even if you know
               the sender, do not open an email attachment that has a strange name or is not referenced in
               the body of the email—it may have been transmitted automatically, without the sender’s
               knowledge.


               If you believe your computer has been infected by a virus, worm, or other security threat, you
               must inform the appropriate IT department or your supervisor.

               You may not share your email passwords with anyone, including coworkers or family members.


               Checks and Balances, Inc.                     32                                         1/2017

               Disclaimer: This Handbook contains internal confidential propriety information.  The policies can change at any time, for any
               reason, without warning.
   31   32   33   34   35   36   37   38   39   40   41