SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Staff Code of Conduct
Confidential Page 1 of 6
CODE OF CONDUCT FOR SECRECY, INTERNET AND
EMAIL USAGE
RULE DECLARATION OF SECRECY & DATA PROTECTION
<YourCompany> employee shall not during the course of, and after the end of the employment with
<YourCompany>, except in the proper course of his / her duties, or with the prior approval in
writing, divulge or make use of any classified, confidential information or of any correspondence,
connections or dealings gained during his / her employment.
I - INTERNET & MAIL
Permitted use
The Internet connection and e-mail system of <YourCompany> is primarily for business use.
Occasional and reasonable personal use is permitted, provided that this does not interfere
with the performance of work duties and responsibilities.
Users may use <YourCompany>'s Internet services for personal purposes, provided that such
use is consistent with professional conduct, not for personal financial gain, and does not affect
the employees’ performance.
Users may send and receive Business related e-mail attachments that do not exceed 5 MB
in size.
If an attachment exceeds 5MB, it can be sent:
Internally at <YourCompany>, through the shared folder in the File Server.
(fsrv<YourCompany>Shared).The shared folder is a temporary area for
communication. Files are not to be stored in this location for a period that exceeds a
month. Otherwise, they will be automatically deleted.
Externally to Suppliers, Customers, Partners, Sister Companies, or others:
Employees have to request uploading files to the FTP site, whereby the other party may
download them. A username and a password will be granted to the receiving
party, to insure security and confidentiality. Files are not to be stored in this location for
a period that exceeds a month. Otherwise, they will be automatically deleted
Staff Code of Conduct
Confidential Page 2 of 6
Users may send and receive short text messages with no enclosures for non-business
purposes. <YourCompany> requests that the personal e-mail not to be read in the office and
that any personal e-mail you receive must be forwarded to a non-business account to be
viewed at your leisure.
Prohibited use
Users shall not use <YourCompany>’s Internet or e-mail services to view, download,
save, receive, or send material related to or including:
 Sending business-confidential information by e-mail or over the Internet.
 Dispersing corporate data to customers or clients without authorization.
 Offensive content of any kind, including pornographic material.
 Promoting discrimination on the basis of race, gender, national origin, age, marital
status, sexual orientation, religion, or disability.
 Threatening or violent behavior.
 Illegal activities.
 Non business related Commercial messages.
 Messages of a political or racial nature.
 Gambling.
 Sports, entertainment, and job information and /or sites.
 Personal financial gain.
 Forwarding e-mail chain letters.
 Spamming e-mail accounts from <YourCompany>’s e-mail services or company
machines.
 Material protected under copyright laws.
 Misrepresent the company to others.
Responsibilities
<YourCompany>’s users are responsible for:
 Honoring acceptable use policies of networks accessed through <YourCompany>’s
Internet and e-mail services.
 Abiding by existing federal, state, and local telecommunications and networking laws
and regulations.
 Following copyright laws regarding protected commercial software or intellectual
property.
Staff Code of Conduct
Confidential Page 3 of 6
 Minimizing unnecessary network traffic that may interfere with the ability of others to
make effective use of <YourCompany>'s network resources. Examples of this may be
dumping Gigabytes of data into the fileserver or the shared folder at once.
Inbound Mail
Virus scanning is normally completed when a message is received. However, you must not
open files, messages or e-mail attachments without first ensuring that the sender is known to
you. If a message is received from an unknown source or with a suspicious attachment, refer
to the local IT Helpdesk.
If you receive unsolicited e-mails or attachments that could damage the Company's reputation
or are of an offensive nature, please advise your line manager who will contact IT
immediately. This includes all ‘Chain’ or 'Pyramid' style correspondence.
Outbound Mail
By using unencrypted e-mails, there is a risk that business communications could be
intercepted and used in a manner that is damaging the reputation of the Company.
If the subject matter is both sensitive and confidential, and since encryption is not an option
for every outbound mail, use an appropriate alternative method, CDs, delivery by hand or
through a trusted party, etc…
FOR BOTH INBOUND AND OUTBOUND E-MAIL, PLEASE CONSULT WITH THE I.T.
DEPARTMENT IF IN DOUBT, NEED ASSISTANCE OR If THE ISSUE IS NOT CLEAR
TO YOU.
ANY BREACH OF THE ABOVE REQUIREMENTS WILL BE REGARDED AS A
DISCIPLINARY OFFENCE.
Violations
Violations will be reviewed on a case-by-case basis. If it is determined that a user has violated
one or more of the above use regulations, user will receive a warning from his or her
supervisor and his or her future use will be closely monitored. If continuous violations keep on
taking place, management will take immediate action; e.g. revoking Internet access and/or e-
mail privileges, and disciplinary action.
II - PHONE USAGE
<YourCompany>’s phone (extension) is the sole property of the company, and using it must be –
without exceptions - to serve business purposes.
Staff Code of Conduct
Confidential Page 4 of 6
Excessive personal usage is strictly prohibited, and management reserves the right to monitor the
“amount” of calls made from one extension through the IT department, and report it to employees’
direct managers. Managers will then determine the consequences of excessive or irregular use,
which may result in losing the employee’s phone and/or calling privileges, payment of the amount
used, and disciplinary action.
III - PC, LAPTOP AND OTHER EQUIPMENT USAGE
Laptops
Technology support of company owned laptops will be equivalent to that provided for company
owned desktop computers.
It is the responsibility of the employee to take appropriate precautions to prevent damage to or
loss/theft of laptop computers in their custody. If the laptop is lost or stolen it must be reported to
admin department immediately.
Employees must inform the IT department before installing any software package on their laptops.
Uncertified software might be harmful to the laptop, and might as well harm the network on
connecting. Employees may not – without IT preapproval - load software for personal use, such as
games, entertainment or personal finance software on a <YourCompany>-owned laptop computer.
Employees are responsible for maintaining an appropriate backup of their laptops, especially of the
work-related documents and data files created that are not restored when reinstalling the operating
system and programs. To ensure that virus protection and other security patches are current and
up-to-date, laptops will automatically be scanned and updated once connected to
<YourCompany>’s network, whether daily or on other frequencies.
Files Storage
Personal files are not to be stored on company’s servers (File Server, Portal, etc…) and PCs.
This includes music, personal pictures, videos, personal software, personal scans, and other
personal documents which can be saved to USB drives, instead of residing on Company’s
resources.
PRINTING
Color printing is relatively expensive and therefore, employees may not print color output, unless it
is to be used as formal <YourCompany> memos, management reports, or customer/vendor related
documentation.
Testing, personal, reading material, and other needless documents are to be printed with the
grayscale option, or viewed electronically.
Staff Code of Conduct
Confidential Page 5 of 6
<YourCompany> will generate monthly reports by department, regarding printing colored versus
grayscale printouts, and will communicate to department heads for their action.
PASSWORD USAGE
Passwords are the most common method of personal identification used in conjunction with remote
terminals to deter unauthorized access to computer systems and networks. To stay on the safe
side, here are some guidelines to be followed:
Select a Wise Password
To minimize password guessing:
 Do not use any part of the account identifier (username, login ID, etc.).
 Use 8 or more characters.
 Use mixed alpha and numeric characters.
 Use two or three short words that are unrelated.
Keep Your Password Safe
 Do not tell your password to anyone.
 Do not let anyone observe you entering your password.
 Do not display your password in your work area or any other highly visible place.
 Change your password periodically (every 2-3 months is recommended and a minimum of 2
days).
 Do not reuse old passwords.
Additional Security Practices
 Ensure your workstation is reasonably secure in your absence from your office. Consider
using a password-protected screen saver, logging off, locking or turning off your monitor when
you leave the room/cubicle.
Staff Code of Conduct
Confidential Page 6 of 6
HR & ADMIN DEPARTMENT
<YOURCOMPANY>
Dear Sir,
RE: STAFF CODE OF CONDUCT
I acknowledge receipt of <YourCompany>'s staff Code of Conduct and I hereby agree to fully
comply with terms and conditions as stated in the subject code. I also acknowledge that any breach
of the Code of Conduct will lead to disciplinary action.
I hereby commit to comply with the letter and spirit of all laws and regulations of the <Country>,
company policies and all stipulation contained herein in the Code of Conduct.
Yours faithfully,
Name: Staff Number:
Signature: Date:

Weitere ähnliche Inhalte

Was ist angesagt?

Clean desk policy Document
Clean desk policy DocumentClean desk policy Document
Clean desk policy DocumentAnirudh Sharma
 
Chapter 4 Occupational Hazards, Industrial Safety and Health Issues(FASS)
Chapter 4 Occupational Hazards, Industrial Safety and Health Issues(FASS)Chapter 4 Occupational Hazards, Industrial Safety and Health Issues(FASS)
Chapter 4 Occupational Hazards, Industrial Safety and Health Issues(FASS)Md Shaifullar Rabbi
 
Workplace Monitoring
Workplace MonitoringWorkplace Monitoring
Workplace MonitoringNikhil Jain
 
IRJET- Occupational Health and Safety in Cement Industry
IRJET- Occupational Health and Safety in Cement IndustryIRJET- Occupational Health and Safety in Cement Industry
IRJET- Occupational Health and Safety in Cement IndustryIRJET Journal
 
Occupational Health and Safety Powerpoint Presentation
Occupational Health and Safety Powerpoint PresentationOccupational Health and Safety Powerpoint Presentation
Occupational Health and Safety Powerpoint PresentationJoLowe72
 
Health and Safety Policies
Health and Safety PoliciesHealth and Safety Policies
Health and Safety PoliciesElsie Lessing
 
NEW-HIRE ORIENTATION 1.pptx
NEW-HIRE ORIENTATION 1.pptxNEW-HIRE ORIENTATION 1.pptx
NEW-HIRE ORIENTATION 1.pptxKathPunongbayan1
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artJames Mulhern
 
Health and Safety Handbook
Health and Safety HandbookHealth and Safety Handbook
Health and Safety HandbookAbu Bakr Ali
 
Top 10 education specialist interview questions and answers
Top 10 education specialist interview questions and answersTop 10 education specialist interview questions and answers
Top 10 education specialist interview questions and answersjobbking39
 
Dishwasher cover letter
Dishwasher cover letterDishwasher cover letter
Dishwasher cover letteralicebrown518
 
Industrial accidents & hazards
Industrial accidents & hazardsIndustrial accidents & hazards
Industrial accidents & hazardsAshish Diggi
 
Data analyst resume
Data analyst resumeData analyst resume
Data analyst resumeuday mahana
 
Occupational Safety and Health Culture as a Fundamental Area in Workplace
Occupational Safety and Health Culture as a Fundamental Area in WorkplaceOccupational Safety and Health Culture as a Fundamental Area in Workplace
Occupational Safety and Health Culture as a Fundamental Area in WorkplaceAmb Steve Mbugua
 
Principles of Risk Assessment
Principles of Risk AssessmentPrinciples of Risk Assessment
Principles of Risk AssessmentDjCurrie
 

Was ist angesagt? (20)

E-Mail Management
E-Mail ManagementE-Mail Management
E-Mail Management
 
Clean desk policy Document
Clean desk policy DocumentClean desk policy Document
Clean desk policy Document
 
Chapter 4 Occupational Hazards, Industrial Safety and Health Issues(FASS)
Chapter 4 Occupational Hazards, Industrial Safety and Health Issues(FASS)Chapter 4 Occupational Hazards, Industrial Safety and Health Issues(FASS)
Chapter 4 Occupational Hazards, Industrial Safety and Health Issues(FASS)
 
Payroll Sytem
Payroll SytemPayroll Sytem
Payroll Sytem
 
Workplace Monitoring
Workplace MonitoringWorkplace Monitoring
Workplace Monitoring
 
Welcome heath safety
Welcome heath safetyWelcome heath safety
Welcome heath safety
 
IRJET- Occupational Health and Safety in Cement Industry
IRJET- Occupational Health and Safety in Cement IndustryIRJET- Occupational Health and Safety in Cement Industry
IRJET- Occupational Health and Safety in Cement Industry
 
Occupational Health and Safety Powerpoint Presentation
Occupational Health and Safety Powerpoint PresentationOccupational Health and Safety Powerpoint Presentation
Occupational Health and Safety Powerpoint Presentation
 
Health and Safety Policies
Health and Safety PoliciesHealth and Safety Policies
Health and Safety Policies
 
NEW-HIRE ORIENTATION 1.pptx
NEW-HIRE ORIENTATION 1.pptxNEW-HIRE ORIENTATION 1.pptx
NEW-HIRE ORIENTATION 1.pptx
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
 
Health and Safety Handbook
Health and Safety HandbookHealth and Safety Handbook
Health and Safety Handbook
 
Top 10 education specialist interview questions and answers
Top 10 education specialist interview questions and answersTop 10 education specialist interview questions and answers
Top 10 education specialist interview questions and answers
 
Dishwasher cover letter
Dishwasher cover letterDishwasher cover letter
Dishwasher cover letter
 
Hr manual-template
Hr manual-templateHr manual-template
Hr manual-template
 
Industrial accidents & hazards
Industrial accidents & hazardsIndustrial accidents & hazards
Industrial accidents & hazards
 
Data analyst resume
Data analyst resumeData analyst resume
Data analyst resume
 
oshirrprimer
oshirrprimeroshirrprimer
oshirrprimer
 
Occupational Safety and Health Culture as a Fundamental Area in Workplace
Occupational Safety and Health Culture as a Fundamental Area in WorkplaceOccupational Safety and Health Culture as a Fundamental Area in Workplace
Occupational Safety and Health Culture as a Fundamental Area in Workplace
 
Principles of Risk Assessment
Principles of Risk AssessmentPrinciples of Risk Assessment
Principles of Risk Assessment
 

Ähnlich wie Company code of conduct (IT related)

Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks
 
Cyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyCyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyKunal Sharma
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxhealdkathaleen
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereEmployee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereKelly Savage
 
It policy (ver 1.0)
It policy (ver  1.0)It policy (ver  1.0)
It policy (ver 1.0)sentmery5
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Vijay Dalmia
 
A software engineer designs, develop, tests, and evaluates the sof.docx
A software engineer designs, develop, tests, and evaluates the sof.docxA software engineer designs, develop, tests, and evaluates the sof.docx
A software engineer designs, develop, tests, and evaluates the sof.docxdaniahendric
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfklodianelezi1
 
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNPOLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNLuis Antonio Bustillos López
 
Checklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersChecklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersPeter Hagen
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxtodd331
 

Ähnlich wie Company code of conduct (IT related) (20)

Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Internet Misuse inside the Company
Internet Misuse inside the CompanyInternet Misuse inside the Company
Internet Misuse inside the Company
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT network
 
Cyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyCyber Defense Team's Security Policy
Cyber Defense Team's Security Policy
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereEmployee Misuse of Internet and Blogosphere
Employee Misuse of Internet and Blogosphere
 
It policy (ver 1.0)
It policy (ver  1.0)It policy (ver  1.0)
It policy (ver 1.0)
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
Poicy 121
Poicy 121Poicy 121
Poicy 121
 
IT Policy
IT PolicyIT Policy
IT Policy
 
A software engineer designs, develop, tests, and evaluates the sof.docx
A software engineer designs, develop, tests, and evaluates the sof.docxA software engineer designs, develop, tests, and evaluates the sof.docx
A software engineer designs, develop, tests, and evaluates the sof.docx
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdf
 
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNPOLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
 
Computer Basics in the Work Place
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
 
Data security
 Data security  Data security
Data security
 
Checklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersChecklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workers
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
 

Kürzlich hochgeladen

The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 

Kürzlich hochgeladen (20)

The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 

Company code of conduct (IT related)

  • 1. Staff Code of Conduct Confidential Page 1 of 6 CODE OF CONDUCT FOR SECRECY, INTERNET AND EMAIL USAGE RULE DECLARATION OF SECRECY & DATA PROTECTION <YourCompany> employee shall not during the course of, and after the end of the employment with <YourCompany>, except in the proper course of his / her duties, or with the prior approval in writing, divulge or make use of any classified, confidential information or of any correspondence, connections or dealings gained during his / her employment. I - INTERNET & MAIL Permitted use The Internet connection and e-mail system of <YourCompany> is primarily for business use. Occasional and reasonable personal use is permitted, provided that this does not interfere with the performance of work duties and responsibilities. Users may use <YourCompany>'s Internet services for personal purposes, provided that such use is consistent with professional conduct, not for personal financial gain, and does not affect the employees’ performance. Users may send and receive Business related e-mail attachments that do not exceed 5 MB in size. If an attachment exceeds 5MB, it can be sent: Internally at <YourCompany>, through the shared folder in the File Server. (fsrv<YourCompany>Shared).The shared folder is a temporary area for communication. Files are not to be stored in this location for a period that exceeds a month. Otherwise, they will be automatically deleted. Externally to Suppliers, Customers, Partners, Sister Companies, or others: Employees have to request uploading files to the FTP site, whereby the other party may download them. A username and a password will be granted to the receiving party, to insure security and confidentiality. Files are not to be stored in this location for a period that exceeds a month. Otherwise, they will be automatically deleted
  • 2. Staff Code of Conduct Confidential Page 2 of 6 Users may send and receive short text messages with no enclosures for non-business purposes. <YourCompany> requests that the personal e-mail not to be read in the office and that any personal e-mail you receive must be forwarded to a non-business account to be viewed at your leisure. Prohibited use Users shall not use <YourCompany>’s Internet or e-mail services to view, download, save, receive, or send material related to or including:  Sending business-confidential information by e-mail or over the Internet.  Dispersing corporate data to customers or clients without authorization.  Offensive content of any kind, including pornographic material.  Promoting discrimination on the basis of race, gender, national origin, age, marital status, sexual orientation, religion, or disability.  Threatening or violent behavior.  Illegal activities.  Non business related Commercial messages.  Messages of a political or racial nature.  Gambling.  Sports, entertainment, and job information and /or sites.  Personal financial gain.  Forwarding e-mail chain letters.  Spamming e-mail accounts from <YourCompany>’s e-mail services or company machines.  Material protected under copyright laws.  Misrepresent the company to others. Responsibilities <YourCompany>’s users are responsible for:  Honoring acceptable use policies of networks accessed through <YourCompany>’s Internet and e-mail services.  Abiding by existing federal, state, and local telecommunications and networking laws and regulations.  Following copyright laws regarding protected commercial software or intellectual property.
  • 3. Staff Code of Conduct Confidential Page 3 of 6  Minimizing unnecessary network traffic that may interfere with the ability of others to make effective use of <YourCompany>'s network resources. Examples of this may be dumping Gigabytes of data into the fileserver or the shared folder at once. Inbound Mail Virus scanning is normally completed when a message is received. However, you must not open files, messages or e-mail attachments without first ensuring that the sender is known to you. If a message is received from an unknown source or with a suspicious attachment, refer to the local IT Helpdesk. If you receive unsolicited e-mails or attachments that could damage the Company's reputation or are of an offensive nature, please advise your line manager who will contact IT immediately. This includes all ‘Chain’ or 'Pyramid' style correspondence. Outbound Mail By using unencrypted e-mails, there is a risk that business communications could be intercepted and used in a manner that is damaging the reputation of the Company. If the subject matter is both sensitive and confidential, and since encryption is not an option for every outbound mail, use an appropriate alternative method, CDs, delivery by hand or through a trusted party, etc… FOR BOTH INBOUND AND OUTBOUND E-MAIL, PLEASE CONSULT WITH THE I.T. DEPARTMENT IF IN DOUBT, NEED ASSISTANCE OR If THE ISSUE IS NOT CLEAR TO YOU. ANY BREACH OF THE ABOVE REQUIREMENTS WILL BE REGARDED AS A DISCIPLINARY OFFENCE. Violations Violations will be reviewed on a case-by-case basis. If it is determined that a user has violated one or more of the above use regulations, user will receive a warning from his or her supervisor and his or her future use will be closely monitored. If continuous violations keep on taking place, management will take immediate action; e.g. revoking Internet access and/or e- mail privileges, and disciplinary action. II - PHONE USAGE <YourCompany>’s phone (extension) is the sole property of the company, and using it must be – without exceptions - to serve business purposes.
  • 4. Staff Code of Conduct Confidential Page 4 of 6 Excessive personal usage is strictly prohibited, and management reserves the right to monitor the “amount” of calls made from one extension through the IT department, and report it to employees’ direct managers. Managers will then determine the consequences of excessive or irregular use, which may result in losing the employee’s phone and/or calling privileges, payment of the amount used, and disciplinary action. III - PC, LAPTOP AND OTHER EQUIPMENT USAGE Laptops Technology support of company owned laptops will be equivalent to that provided for company owned desktop computers. It is the responsibility of the employee to take appropriate precautions to prevent damage to or loss/theft of laptop computers in their custody. If the laptop is lost or stolen it must be reported to admin department immediately. Employees must inform the IT department before installing any software package on their laptops. Uncertified software might be harmful to the laptop, and might as well harm the network on connecting. Employees may not – without IT preapproval - load software for personal use, such as games, entertainment or personal finance software on a <YourCompany>-owned laptop computer. Employees are responsible for maintaining an appropriate backup of their laptops, especially of the work-related documents and data files created that are not restored when reinstalling the operating system and programs. To ensure that virus protection and other security patches are current and up-to-date, laptops will automatically be scanned and updated once connected to <YourCompany>’s network, whether daily or on other frequencies. Files Storage Personal files are not to be stored on company’s servers (File Server, Portal, etc…) and PCs. This includes music, personal pictures, videos, personal software, personal scans, and other personal documents which can be saved to USB drives, instead of residing on Company’s resources. PRINTING Color printing is relatively expensive and therefore, employees may not print color output, unless it is to be used as formal <YourCompany> memos, management reports, or customer/vendor related documentation. Testing, personal, reading material, and other needless documents are to be printed with the grayscale option, or viewed electronically.
  • 5. Staff Code of Conduct Confidential Page 5 of 6 <YourCompany> will generate monthly reports by department, regarding printing colored versus grayscale printouts, and will communicate to department heads for their action. PASSWORD USAGE Passwords are the most common method of personal identification used in conjunction with remote terminals to deter unauthorized access to computer systems and networks. To stay on the safe side, here are some guidelines to be followed: Select a Wise Password To minimize password guessing:  Do not use any part of the account identifier (username, login ID, etc.).  Use 8 or more characters.  Use mixed alpha and numeric characters.  Use two or three short words that are unrelated. Keep Your Password Safe  Do not tell your password to anyone.  Do not let anyone observe you entering your password.  Do not display your password in your work area or any other highly visible place.  Change your password periodically (every 2-3 months is recommended and a minimum of 2 days).  Do not reuse old passwords. Additional Security Practices  Ensure your workstation is reasonably secure in your absence from your office. Consider using a password-protected screen saver, logging off, locking or turning off your monitor when you leave the room/cubicle.
  • 6. Staff Code of Conduct Confidential Page 6 of 6 HR & ADMIN DEPARTMENT <YOURCOMPANY> Dear Sir, RE: STAFF CODE OF CONDUCT I acknowledge receipt of <YourCompany>'s staff Code of Conduct and I hereby agree to fully comply with terms and conditions as stated in the subject code. I also acknowledge that any breach of the Code of Conduct will lead to disciplinary action. I hereby commit to comply with the letter and spirit of all laws and regulations of the <Country>, company policies and all stipulation contained herein in the Code of Conduct. Yours faithfully, Name: Staff Number: Signature: Date: