Page 29 - Temporary Solutions Inc. Employee Handbook 2017
P. 29

COMPUTERS, EMAIL AND INTERNET


               USE OF CLIENT PROPERTY, EQUIPMENT, INTERNET AND COMMUNICATIONS
               SYSTEMS



               EMAIL IS NOT PRIVATE

               Email messages, including attachments, sent and received on our or a client’s equipment
               belong to us or the client, respectively.  We and/or the client reserve the right to access,
               monitor, read, and/or copy email messages at any time, for any reason.  This includes messages
               considered to be personal or labeled with a designation such as “Personal” or “Private” if sent
               and received on our or client equipment.


               ALL CONDUCT RULES APPLY TO EMAIL

               All of our policies and rules of conduct apply to employee use of the email system. This means,
               for example, that you may not use the email system to send harassing or discriminatory
               messages, including messages with explicit sexual content or pornographic images; to send

               threatening messages; or to reveal our or the client’s trade secrets or confidential information.


               PROFESSIONAL TONE AND CONTENT
               We expect you to exercise discretion in using electronic communications equipment. When you

               send email using communications equipment meant for conducting business, you are
               representing us and/or the client. Make sure that your messages are professional and
               appropriate, in tone and content. Remember, although email may seem like a private
               conversation, email can be printed, saved, and forwarded to unintended recipients. You should
               not send any email that you wouldn’t want your boss, your mother, us or the client’s
               competitors to read.


               EMAIL SECURITY

               To avoid email viruses and other threats, you should not open email attachments from people
               and businesses that you don’t recognize, particularly if the email appears to have been
               forwarded multiple times or has a nonexistent or peculiar subject heading. Even if you know
               the sender, do not open an email attachment that has a strange name or is not referenced in

               the body of the email—it may have been transmitted automatically, without the sender’s
               knowledge.

               If you believe your computer has been infected by a virus, worm, or other security threat, you
               must inform the appropriate IT department or your supervisor.


               Temporary Solutions, Inc.                     28                                         2/2017

               Disclaimer: This Handbook contains internal confidential propriety information.  The policies can change at any time, for any
               reason, without warning.
   24   25   26   27   28   29   30   31   32   33   34