Page 61 - My Clinic Employee Handbook Draft V.1
P. 61
• Helping to trace and resolve technical faults.
• Protecting and maintaining network and system security.
• Maintaining system performance and availability.
• Ensure the privacy and integrity of information stored on the Company’s network.
• Investigating actual and suspected security incidents.
• Preventing, detecting and minimising inappropriate use.
• Protecting the rights and property of the Company, its employees, customers and clients.
• Ensuring compliance with Company policies, current legislation and applicable regulations.
• While the Company does not routinely monitor an individual user’s use of its electronic
communications, email and internet activity it reserves the right to do so when a breach of its policies
or illegal activity is suspected.
• In the process of dealing with computer support calls, if necessary, the Company’s selected ICT
provider, may need to access a user’s computer to resolve the support call. In such circumstances ICT
provider staff must respect the privacy of the individual user and not access information, documents
or emails of a personal nature without the user’s permission or unless they need to in order to resolve
the support call. In some cases, the ICT provider may use remote control software to connect and take
control of a user’s computer remotely. In such circumstances the ICT staff will not use this software to
connect to the user’s computer without first attempting to contact the user of the computer first.
Personal Use
The Company’s electronic communications, email and internet services are to be used for business-related
purposes only. Under no circumstances can access to Company Wi-if be afforded to any non-member of staff.
Email and Messenger Services
The primary purpose of the Company’s email and messenger system is to promote effective communication on
Company business matters. Authorised users may be granted access to email services subject to the
requirements of their role within the Company.
• Users must respect the privacy of others at all times and only use email accounts that have been issued
to them.
• Users who use the email system for personal use must ensure they present their communications in
such a way that it is clear to the recipient that the email is of a personal nature and is not a
communication on behalf of the Company.
• Users should be careful when using their Company email account to send personal messages that their
words or actions do not have a negative impact on the Company in any way.
• Only email facilities provided by the Company may be used in connection with an individual user work
for the Company. The use of third-party web-based email services for the transmission of Company
confidential or restricted information is strictly prohibited.
• Access to third party web-based email servers is not allowed using the Company network. However,
email messages can be sent from the Company network to third party web-based email servers, but it
should be noted that this is not a secure method of sending information.
• For security reasons users who regularly receive Company confidential or restricted information via
email must not forward their Company email messages to their own personal third-party web-based
email account.
• Users should ensure they keep their personal email messages separate from their Company business
related email messages.
• All email accounts maintained on the Company’s email system are the property of the Company.
• Users leaving the employment of the Company must ensure they forward on all important business-
related email messages to their line manager or work colleagues before they leave so that there is no
disruption to service delivery after they leave. They should also ensure they remove or delete all
Page 60 of 75
ORC.MYC.DV1