Page 58 - O'Kelly Sutton Employee Handbook June 23 Revision 2 2020
P. 58

Monitoring:

               The Company reserves the right to routinely monitor, log and record any and all use of its electronic
               communications, email, and internet facilities for the purpose of:
                   •  Helping to trace and resolve technical faults.
                   •  Protecting and maintaining network and system security.
                   •  Maintaining system performance and availability.
                   •  Ensure the privacy and integrity of information stored on the Company’s network.
                   •  Investigating actual and suspected security incidents.
                   •  Preventing, detecting, and minimising inappropriate use.

                   •  Protecting the rights and property of the Company, its employees, customers, and clients.
                   •  Ensuring compliance with Company policies, current legislation, and applicable regulations.
                   •  While  the  Company  does  not  routinely  monitor  an  individual  user’s  use  of  its  electronic
                       communications, email, and internet activity it reserves the right to do so when a breach of
                       its policies or illegal activity is suspected.
                   •  In the process of dealing with computer support calls, if necessary, the Company’s selected
                       ICT  provider,  may  need  to  access  a  user’s  computer  to  resolve  the  support  call.  In  such
                       circumstances ICT provider staff must respect the privacy of the individual user and not access
                       information,  documents, or  emails  of a  personal  nature  without  the  user’s  permission  or
                       unless they need to in order to resolve the support call. In some cases, the ICT provider may
                       use remote control software to connect and take control of a user’s computer remotely. In
                       such circumstances the ICT staff will not use this software to connect to the user’s computer
                       without first attempting to contact the user of the computer first.

               Personal Use

               The Company’s electronic communications, email and internet services are to be used for business-
               related purposes only. Under no circumstances can access to Company Wi-if be afforded to any non-
               member of staff.

               Email and Messenger Services
               The  primary  purpose  of  the  Company’s  email  and  messenger  system  is  to  promote  effective
               communication  on  Company  business  matters.  Authorised  users  may  be  granted  access  to  email
               services subject to the requirements of their role within the Company.

                   •  Users must respect the privacy of others at all times and only use email accounts that have
                       been issued to them.
                   •  Users  who  use  the  email  system  for  personal  use  must  ensure  they  present  their
                       communications in such a way that it is clear to the recipient that the email is of a personal
                       nature and is not a communication on behalf of the Company.
                   •  Users should be careful when using their Company email account to send personal messages
                       that their words or actions do not have a negative impact on the Company in any way.
                   •  Only email facilities provided by the Company may be used in connection with an individual
                       user  work  for  the  Company.  The  use  of  third-party  web-based  email  services  for  the
                       transmission of Company confidential or restricted information is strictly prohibited.
                   •  Access to third party web-based email servers is not allowed using the Company network.
                       However, email messages can be sent from the Company network to third party web-based
                       email servers, but it should be noted that this is not a secure method of sending information.
                   •  For  security  reasons  users  who  regularly  receive  Company  confidential  or  restricted
                                                      Page 57 of 82
   53   54   55   56   57   58   59   60   61   62   63