Page 54 - O'Shea Group EHB May 2019
P. 54
define acceptable use of the Company’s electronic communications, email, internet and intranet
services.
This policy is mandatory and by using any of the Company’s electronic communications, email or
internet, employees are agreeing to abide by the terms of this policy.
This policy applies to:
• All electronic communications, email, internet and intranet services provided by the
Company;
• All Information Technology (I.T.) resources provided by the Company;
• All user (employees, students, contractors, sub-contractors and authorised third-party
commercial service providers) of the Company’s electronic communications, email and
internet facilities;
• All use (both personal and Company business related) of the Company’s electronic
communications, email and internet facilities;
• All connections to (locally or remotely) the Company’s email, internet and intranet facilities;
• All connections made to external networks through the Company’s broadband network.
Acceptable Use:
The acceptable use of the Company’s electronic communications, email and internet and services is
based on the following principles:
• Access to the Company’s email and internet facilities should be regarded as a business
requirement and not an automatic entitlement.
• Users have a responsibility to ensure that they use Company’s email, internet and intranet
facilities at all times in a manner which is lawful, ethical and efficient.
• Users are expected to respect the rights and property of others, including privacy,
confidentiality and intellectual property.
• Users are expected to respect the integrity and security of the Company’s email, internet, and
intranet facilities.
Monitoring:
The Company reserves the right to routinely monitor, log and record any and all use of its electronic
communications, email and internet facilities for the purpose of:
• Helping to trace and resolve technical faults.
• Protecting and maintaining network and system security.
• Maintaining system performance and availability.
• Ensure the privacy and integrity of information stored on the Company’s network.
• Investigating actual and suspected security incidents.
• Preventing, detecting and minimising inappropriate use.
• Protecting the rights and property of the Company, its employees, customers and clients.
• Ensuring compliance with Company policies, current legislation and applicable regulations.
• While the Company does not routinely monitor an individual user’s use of its electronic
communications, email and internet activity it reserves the right to do so when a breach of its
policies or illegal activity is suspected.
• In the process of dealing with computer support calls, if necessary, the Company’s selected
ICT provider, may need to access a user’s computer to resolve the support call. In such
Page 53 of 70