Page 53 - O'Kelly Sutton Employee Handbook June 23 Revision 2 2020
P. 53
It is the policy of OKS to secure and protect all our employees, business, information systems, data,
and property.
3.18.2 Personal Property
Employees should ensure that their personal belongings are kept secure. The Company cannot be held
liable for any loss or damage to personal property because of theft or accident.
3.18.3 Company Property
Company property is not to be removed from the premises without the prior permission of a member
of the management team. Unauthorised removal and/or theft of Company property will be
investigated and may result in disciplinary action, up to and including dismissal.
Employees seeking to borrow company equipment must do so only with the expressed permission of
a Partner/Director, confirmed in writing stating the item(s) borrowed and time limit on same.
Access to Company Sites
Access to a company site for personal use is strictly forbidden, particularly outside of normal working
hours. Employees seeking to access a company site must do so only with the expressed permission of
a MANAGER. The Company reserve the right to refuse entry to a site outside of normal working hours.
Lone-working must be authorised on-site outside of normal working hours.
Employees who are issued with Company property such as work tools, samples, finished product or
other articles, laptop computers and mobile telephones are required to look after their safety when
taken off Company premises. Such items should not be left in an unattended area or in an unoccupied
vehicle at any time.
3.18.4 Unauthorised Software
Only software, which has been licensed by the Company, may be used on the Company's computer
systems and under no circumstances should copyrighted software be copied or shared. The
Company’s regularly conducts audits of the network to check for unauthorised software.
3.18.5 Personal Software
You may not load any software or disk which has not been checked for electronic virus(es) by the
Company. You are requested not to attach any equipment to your PC without the prior approval of
the IT Service provider or a MANAGER.
3.18.6 General PC Security
You must also adhere to general IT security policy by using confidential passwords to access work files
and individual document passwords on confidential files.
3.19 PRIVACY AND DATA PROTECTION
Please refer to the Company Privacy and Data Protection Policy for full details. The
information in this section is intended to give you an indication of your duties and
responsibilities with regard to your own privacy and the privacy of individuals.
3.19.1 Definitions
‘Data Protection Acts’ refers to the General Data Protection Regulation (GDPR). Those who keep
data about individuals, including employers, must comply with data protection principles.
Page 52 of 82