Page 29 - Honeygrow Employee Handbook PROOF
P. 29
RESTAURANT POLICIES + PRACTICES
stored or held on Company owned, leased, or provided equipment or personal equipment used to conduct Company business.
Each team member is responsible for reading this Computer Usage Policy and understanding the policy. Any violations of the Computer Usage Policy may result in: (i) suspension or revocation of your computer account; and/ or (ii) disciplinary action up to and including termination of employment.
Team members should not have any expectation of privacy while using honeygrow’s computer systems. This includes but is not limited to, communications on honeygrow’s computer systems with any person or entity, including attorneys, accountants, medical professionals, made while using honeygrow’s email accounts and/ or private password protected email accounts (e.g. gmail, etc.), subject to applicable federal or state law. The computer systems and all communications and documents sent, received, stored, reviewed, and/or created by team members while using honeygrow’s computer systems are solely the property of honeygrow. Honeygrow, as permitted by law, intends to, and will exercise its right to access, review, audit, intercept, copy, read and/or otherwise monitor any and all team member communications and documents sent, received, reviewed, stores and/or created on honeygrow’s computer systems to ensure that its systems are being used in compliance with the law, this policy and other policies. Monitor and and all team member communications and documents sent, received, stored and/or created by team members in their use.
Misuse of Computer Resources
1. A team member may not tamper with the Company Computer Systems, networks, equipment, software, files, documentation, accounts or information therewith. This Computer Usage Policy applies to the direct and indirect use of local and remote computer resources.
2. Non-hg employees are not permitted access to our Computer Systems.
3. A Team member is prohibited from assisting anyone in violating this
policy.
4. A Team member is prohibited from giving that Team member’s
own password to any individual, except to authorized personnel of the Information Services Department. Each team member must safeguard that team member’s own account and its contents, and will be responsible for any misuse. A team member may not search for,
26