Page 31 - Bunkhouse 2017 Employee Handbook
P. 31
Visitors
Visitors (children, parents, spouse, or friends) are not allowed in your work area. Our insurance does not cover
unauthorized people on the account. The presence of a visitor also reflects negatively on the productivity and
professionalism of our employees.
Work Area
A neat and orderly work area makes for a more pleasant, productive, and safe place to work. You are expected to
keep your surroundings clean and presentable as a courtesy to fellow employees and guests who may personally
visit your work area. Furthermore, you are expected to clean up after yourself in shared work areas (i.e. copy rooms/
areas, kitchens, bathrooms).
VOICEMAIL, EMAIL AND INTERNET ACCEPTABLE USE POLICY
It is the goal of the company to facilitate the proper use of Information Technology (IT) in the interests of its
business. This policy is intended to provide a framework for the responsible and legal use of voicemail, email, and
Internet, and explains monitoring which may take place to ensure acceptable use of these facilities. All employees
and contractors using company Internet, voicemail, fax, and e-mail systems must comply with the company’s
regulations pertaining to the use of company facilities, equipment, and resources.
IT resources are provided to facilitate your work for and on behalf of the company, and all company IT resources,
including voicemail, emails, fax, and related data pertaining to the business of the company are the property of
the company. Limited use of the company’s IT resources for other purposes, such as accessing personal e-mail or
recreational use of the Web, is allowed as a benefit to staff; however, personal information or data should not be
stored on company computers or data storage mediums. Access of the company’s IT resources for personal use
is not a right. Any use of these resources must not interfere with the employee’s duties or anyone else’s use of
facilities for work purposes and must not, in any way, adversely affect the company’s business operations.
The company routinely monitors the overall patterns of e-mail, telephone calls, and Internet usage and may, at its
discretion, monitor the use made of the facilities by any individual. Detailed tracking and monitoring of e-mails
and data related to the business of the company may be required by regulatory authorities, as a normal course of
business, or as part of a company investigation into violation of company policy. While the company will at all times
seek to act in a fair manner, you should be aware that there can be no legitimate expectation of privacy when using
the company’s IT resources, including e-mail, telephones, voicemail, fax, computers, and Internet facilities. All
activities may be monitored at any time.
Unacceptable use of company computers and network resources include but are not limited to:
• The viewing, retention, or distribution of material that is offensive, obscene or indecent
• Causing annoyance, inconvenience, or needless anxiety to others
• Defamation
• Gambling
• For illegal purposes or in the commission of a crime
• Intellectual property rights infringements
• Unsolicited advertising (“spamming”)
• Attempts to break into or damage computer systems or data held thereon
• The distribution or storage of pirated software
31