Page 49 - Hub Controls Employee Handbook Draft 1.1
P. 49
3.15.3 Social Welfare Benefits
You are not entitled to pay from the Company for carer's leave, but you may be entitled to carer's
Benefit from social welfare. The benefit is subject to certain conditions
3.16 COMPANY SECURITY POLICY
3.16.1 Introduction to Security Policy
It is the policy of HUB CONTROLS LTD to secure and protect all our employees, business, information
systems, data and property.
3.16.2 Personal Property
Employees should ensure that their personal belongings are kept secure. The Company cannot be held
liable for any loss or damage to personal property because of theft or accident.
3.16.3 Company Property
Company property is not to be removed from the premises without the prior permission of a member
of the management team. Unauthorised removal and/or theft of Company property will be
investigated and may result in disciplinary action, up to and including dismissal.
Employees seeking to borrow company equipment must do so only with the expressed permission of
a MANAGER, confirmed in writing stating the item(s) borrowed and time limit on same.
Access to Company Sites
Access to a company site for personal use is strictly forbidden, particularly outside of normal working
hours. Employees seeking to access a company site must do so only with the expressed permission of
a MANAGER. The Company reserve the right to refuse entry to a site outside of normal working hours.
Lone-working must be authorised on-site outside of normal working hours.
Employees who are issued with Company property such as work tools, samples, finished product or
other articles, laptop computers and mobile telephones are required to look after their safety when
taken off Company premises. Such items should not be left in an unattended area or in an unoccupied
vehicle at any time.
3.16.4 Unauthorised Software
Only software, which has been licensed by the Company, may be used on the Company's computer
systems and under no circumstances should copyrighted software be copied or shared. The
Company’s regularly conducts audits of the network to check for unauthorised software.
3.16.5 Personal Software
You may not load any software or disk which has not been checked for electronic virus(es) by the
Company. You are requested not to attach any equipment to your PC without the prior approval of
the IT Service provider or a MANAGER.
3.16.6 General PC Security
You must also adhere to general IT security policy by using confidential passwords to access work files
and individual document passwords on confidential files.
Page 48 of 72
Draft v.1.1