Page 53 - AJ Electrical Employee Handbook 2020
P. 53

This policy applies to:

                   •  All  electronic  communications,  email,  internet  and  intranet  services  provided  by  the
                       Company;
                   •  All Information Technology (I.T.) resources provided by the Company;
                   •  All  user  (employees,  students,  contractors,  sub-contractors  and  authorised  third-party
                       commercial  service  providers)  of  the  Company’s  electronic  communications,  email  and
                       internet facilities;
                   •  All  use  (both  personal  and  Company  business  related)  of  the  Company’s  electronic
                       communications, email and internet facilities;
                   •  All connections to (locally or remotely) the Company’s email, internet and intranet facilities;
                   •  All connections made to external networks through the Company’s broadband network.

               Acceptable Use:
               The acceptable use of the Company’s electronic communications, email and internet and services is
               based on the following principles:

                   •  Access to the Company’s email and internet facilities should be regarded as a business
                       requirement and not an automatic entitlement.
                   •  Users have a responsibility to ensure that they use Company’s email, internet and intranet
                       facilities at all times in a manner which is lawful, ethical and efficient.
                   •  Users are expected to respect the rights and property of others, including privacy,
                       confidentiality and intellectual property.
                   •  Users are expected to respect the integrity and security of the Company’s email, internet, and
                       intranet facilities.

               Monitoring:

               The Company reserves the right to routinely monitor, log and record any and all use of its electronic
               communications, email and internet facilities for the purpose of:

                   •  Helping to trace and resolve technical faults.
                   •  Protecting and maintaining network and system security.
                   •  Maintaining system performance and availability.
                   •  Ensure the privacy and integrity of information stored on the Company’s network.
                   •  Investigating actual and suspected security incidents.
                   •  Preventing, detecting and minimising inappropriate use.
                   •  Protecting the rights and property of the Company, its employees, customers and clients.
                   •  Ensuring compliance with Company policies, current legislation and applicable regulations.
                   •  While  the  Company  does  not  routinely  monitor  an  individual  user’s  use  of  its  electronic
                       communications, email and internet activity it reserves the right to do so when a breach of its
                       policies or illegal activity is suspected.
                   •  In the process of dealing with computer support calls, if necessary, the Company’s selected
                       ICT  provider,  may  need  to  access  a  user’s  computer  to  resolve  the  support  call.  In  such
                       circumstances ICT provider staff must respect the privacy of the individual user and not access
                       information, documents or emails of a personal nature without the user’s permission or unless
                       they need to in order to resolve the support call. In some cases, the ICT provider may use
                       remote control software to connect and take control of a user’s computer remotely. In such




                                                                                               Page 52 of 66
   48   49   50   51   52   53   54   55   56   57   58