Page 52 - ORC Employee Handbook Jan19
P. 52
• All use (both personal and Company business related) of the Company’s electronic
communications, email and internet facilities;
• All connections to (locally or remotely) the Company’s email, internet and intranet facilities;
• All connections made to external networks through the Company’s broadband network.
Acceptable Use:
The acceptable use of the Company’s electronic communications, email and internet and services is
based on the following principles:
• Access to the Company’s email and internet facilities should be regarded as a business
requirement and not an automatic entitlement.
• Users have a responsibility to ensure that they use Company’s email, internet and intranet
facilities at all times in a manner which is lawful, ethical and efficient.
• Users are expected to respect the rights and property of others, including privacy,
confidentiality and intellectual property.
• Users are expected to respect the integrity and security of the Company’s email, internet, and
intranet facilities.
Monitoring:
The Company reserves the right to routinely monitor, log and record any and all use of its electronic
communications, email and internet facilities for the purpose of:
• Helping to trace and resolve technical faults.
• Protecting and maintaining network and system security.
• Maintaining system performance and availability.
• Ensure the privacy and integrity of information stored on the Company’s network.
• Investigating actual and suspected security incidents.
• Preventing, detecting and minimising inappropriate use.
• Protecting the rights and property of the Company, its employees, customers and clients.
• Ensuring compliance with Company policies, current legislation and applicable regulations.
• While the Company does not routinely monitor an individual user’s use of its electronic
communications, email and internet activity it reserves the right to do so when a breach of its
policies or illegal activity is suspected.
• In the process of dealing with computer support calls, if necessary, the Company’s selected
ICT provider, may need to access a user’s computer to resolve the support call. In such
circumstances ICT provider staff must respect the privacy of the individual user and not access
information, documents or emails of a personal nature without the user’s permission or unless
they need to in order to resolve the support call. In some cases, the ICT provider may use
remote control software to connect and take control of a user’s computer remotely. In such
circumstances the ICT staff will not use this software to connect to the user’s computer
without first attempting to contact the user of the computer first.
Personal Use
The Company’s electronic communications, email and internet services are to be used for business-
related purposes only. Under no circumstances can access to Company Wi-if be afforded to any non-
member of staff.
Page 51 of 70