Chapter 4. The effective management of technology in organisations

Size: px
Start display at page:

Download "Chapter 4. The effective management of e-mail technology in organisations"

Transcription

1 Chapter 4 The effective management of technology in organisations 4.1 Introduction In 2002, Agarwal and Rodhain indicated to be the most-used online application. They also identified it as a tried-and-tested method for facilitating unstructured communication among employees, which, in turn, fosters the valuable cross-pollination of ideas and increases innovation in an organisation (Agarwal & Rodhain, 2002). Despite all the benefits we stand to derive from using , however, individuals and organisations alike are faced with an ever-increasing volume of traffic, to the extent that many could start feeling overwhelmed and, even more seriously, overloaded with information. This chapter will, therefore, be devoted to a closer look at the effects of on the user and at the managerial measures organisations could take to prevent overload in their staff. Possible solutions to this problem are to assist employees at acquiring the necessary skills to avoid overload implement a proper management ( EMM ) system take steps in preventing misuse consider other factors when implementing an EMM system, such as corporate e-communication policies monitoring and surveillance software archiving solution software. Next, a discussion on the phenomenon of overload overload In today s fast-paced business environment, represents a quick, effective means of communication, especially useful in multinational corporations where the working hours of customers, suppliers and employees do not necessarily overlap (Mandell, 2001). Employees, and especially executives, however, are being bombarded by messages and plagued by overload The underlying causes of overload There are three main causes for overload, as indicated by Mandell (2001): Improper use Spamming Lack of discipline 61

2 Anon. B (2001) indicates that as the use of in organisations intensifies, many enterprises struggle to manage their infrastructure, as traffic is putting strain on corporate networks and storage requirements. Apart from all the hours devoted to creating, reading and replying to messages, the not-soobvious burden caused by overload is the wastage of resources in bandwidth, servers and memory (Mandell, 2001). Following, then, a discussion on the possible effects of improper usage Possible social effects of overload on users and organisations Palme (1995) indicates that does not merely change the form of communication from other media to computers but that it also changes patterns of communication, so that people communicate with others more often, and about different subjects than before. An in-depth study was undertaken to determine how has influenced and, in some instances, even replaced the use of other media (such as the telephone or printed communication), the results of which are depicted in the pie chart below: Chart 4.1: as replacement for new media (Palme, 1995) 13% Replacement for formal and informal face-to-face meetings 67% 14% 6% Replacement for phone calls Replacement for postal mail, circulars and message slips New communication It was indicated that has indeed changed the social behaviour of employees and users in organisations and, moreover, that it has changed the very social workings of organisations. It has also served to close the communication gap between people who are distant geographically and/or organisationally. Next, figure 4.1 is used to illustrate just how radically communication patterns could change once is introduced, and that it could even culminate in new networks being formed within an organisation. 62

3 Hierarchical organisation Network organisation Figure 4.1: Organisational effects of electronic communication (Palme, 1995) Adam (2002) states that constitutes a means of communication which some people are now incapable of doing without and that, even though it took some time for everyone fully to adapt to it, it has worked an irrevocable change in many users everyday lives. Problems resulting from the very popularity of this technology, however, have, on the other hand, also proliferated, such as information overload, overload, attempts at fraud and other addictive behaviours. Among the negative effects and outcomes of abuse are excessive time spent on non-productive work and a lack of attention to security. Most organisations, however, encourage employees to use and communication systems for business purposes only. Agarwal and Rodhain (2002) attempted in their research to explain these effects by postulating that use has preceded rather than followed the evolution of policies and that, as a consequence, norms rather than edicts are used to guide employee behaviour. Many employees, however, have erroneous or, at best, too high expectations and perceptions as far as privacy is concerned, even though privacy concerns have a significant effect on the way in which they use the system. Conflict could easily arise out of these perceptions, and could cause stress, inefficiency and a loss of trust. Users should, therefore, be well versed in and well informed of the reasons why strict policies on use have been adopted by their organisation. 63

4 The rapid rate at which information-communication technology is developing has given rise to an equally rapid increase in its use, which has, in turn, caused many users to suffer from overload. Users often clutter their Inboxes with an excessive number of messages, including partially read documents, outstanding tasks and conversational threads. High levels of information communication take place and most users would prefer this communication to be effected via an all-in-one medium. Organisations should encourage their employees to exercise control when using this technology, which could manifest in two ways: firstly, in the manner in which employees deal with mail received and, secondly, in the manner in which employees create and send mail. The next section will, therefore, be devoted to a discussion on the management measurers employees could and should take to prevent or, at the very least, minimise their overload Management measures against overload in employees Mandell (2001) offers a simple solution to blocking Internet access for employees who have no need to access it or to receive . Yet another solution would be to implement surveillance programs. Examples of the latter include WinWhatWhere, Kennewick and Surf control. These programs sport features such as access control and the ability to block inappropriate sites and recognise illicit content, and will be discussed in full particulars in the latter part of this chapter. These features, however, are most often applied to s travelling across the World Wide Web. Anon. B (2001) recommends the following ways in which employees and organisations could reduce overload: Use message headers and source indication to help decide which s to read immediately and which to set aside perhaps never to be read. Set aside the same time every day to review received s, starting with the most recently received. Create folders for various categories of received s. Get into the habit of handling a message only once before deleting the file. Should the system of the organisation include a preview pane permitting employees to view the first few lines of each message, this could 64

5 be used when headers and source indication fail to indicate the importance and/or urgency of a message. Should the system be equipped with integrated group scheduling, the calendar function could be used to receive notices of meetings and automatically to place them in the user s calendar. Organisations would be well advised to add to their existing infrastructures by outsourcing certain services, such as group directories and mailing lists, instead of overhauling their entire infrastructures. These services also include full access to mobile , so that valuable information, resources and time are not lost and are integrated with the organisational EMM system Implications of overload to the organisation Organisations are faced with an ever-increasing number of customer queries and must, therefore, implement a proper management system in terms of which Management could adopt strategies to minimise or even prevent overload. Following, then, a discussion on a number of these strategies Storage requirements Most organisations are able to choose a broadband Internet connection, which means that they are able to access a wide variety of communication channels (Anon. B, 2001). Users are able, therefore, to download huge files embedded in s The software solution ( management systems) Good EMM systems can definitely address the service of applications that must render a high level of service at cost. Organisations stand to derive the following benefits from implementing a good EMM system (Anon. C, 2001): Scanning of content and routing of messages to the correct Inboxes. Matching of addresses with customer records. Assigning reference numbers to queries. Generating an automated response that informs customers of the fact that their mail has been received. 65

6 Customers are forever demanding better-quality and quicker services with improved response and turn-around times. The modern-day business environment, therefore, generates more and more service-query s from customers, with the result that EMM systems must be able to manage this deluge of s. It would be safe to say, then, that these systems are set to play a pivotal role in future customer-relationship management Management strategies to minimise or avoid overload has added a new dimension to communication systems, and its pros far outweigh its cons (Davidhizar, et al., 2000). There is a real danger, however, that managers could be wasting their time, given their greater accessibility to a higher volume of s. To managers, overload could be potentially harmful in the following ways (Davidhizar, et al., 2000): It could be time consuming. It could impact on their essential face-to-face interaction with employees. It could result in inefficiency and in turning processing into a burden strategies for managers Management can implement EMM techniques and strategies to control information overload and to promote productivity. Davidhizar and his co-researchers (2000) offer a number of solutions with regard to managers and their overload. Triage messages for urgency and/or importance Managers can, in a bid to save time, use filtering features to classify messages in terms of their urgency and/or importance. This is called the triage technique. Avoid reading certain s altogether Junk sources include s from agency networks, for example, announcements and product promotions or advertising over the Internet. Respond to messages selectively Managers should respond to s selectively. Time-related and requestinformation s should be dealt with first. 66

7 Identify specific times of the day for processing Managers should limit the time they spend reading and responding to s. This will enable them to save time and to slow down their response rates to . Limit access Managers should be selective about giving out their organisational addresses. Prepare brief and readable s to obviate the need for multiple messages s should be compiled in clear, concise and to-the-point language in order to avoid duplication of effort. Due consideration should, however, be given to managers different writing styles, as discussed in chapter 3. Avoid ing when problem-solving is paramount Complex problems requiring negotiation should rather be solved by means of face-to-face communication. management systems boast many other measures that could assist at minimising or avoiding overload and ensuring its effective management. The first step towards creating an effective EMM system would be to formulate and adopt electronic-communication policies. Surveillance and monitoring software could also be integrated to protect the organisation against legal proceedings, confrontation and loss of productivity. Archiving-solution software plays a crucial part in keeping companies compliant with legal and riskmanagement requirements. These three measures and management strategies will be discussed in full particulars in subsequent sections. 4.3 Electronic-communication policies and Nowadays, almost every aspect of business revolves around the computer. More than ever before, the role of computers in business is changing from merely being an efficient means of global communication to becoming the hub of all business activities. These advances came at a cost, however. Employee use of computer resources, including and Internet access, can subject a company to legal liability, compromise confidential information and result in unnecessary problems and an increase in computing costs. Overly (1999) gives examples of problems that could crop up. 67

8 Businesses have chucked veritable fortunes at litigating and settling lawsuits arising from employee abuse and misuse of the technology. Employees use s to circulate inappropriate jokes, to harass and discriminate against co-workers and even to defame rival businesses. Trade secrets and other highly sensitive business information stored on computers have been stolen or inadvertently compromised by employees. Employee use of the Internet for non-business-related activities has seriously compromised corporate security on occasion, and has often resulted in millions lost in productivity and increased computing costs. Searches of business networks routinely turn up hundreds of megabytes of pornographic material and illegal software that were downloaded by employees. Businesses would be well advised, therefore, to take the necessary steps to reduce such risks. Following, a list of possible steps to be taken in this regard (Overly, 1999): Adopt written policies on computer and use that specifically define the rights and obligations of employees regarding computer resources. Conduct training and awareness seminars for employees regarding the proper use of their computers and Internet and access. Install appropriate monitoring and filtering software to prevent access to inappropriate material and to identify problem employees. The next section will be devoted to taking a closer look at the importance of adopting written e-communication policies, and at how such policies could influence employees use of The need for written policies Despite the growing use of computers and Internet and access in the workplace and its potential for liability, not many companies have established written guidelines for employee use of computer systems. Businesses have to be aware of the potential pitfalls associated with these new technologies and of the need to protect themselves by adopting appropriate guidelines and policies. In the event of a lawsuit, a well-defined policy may even mean the difference between liability for damages and the early dismissal of the case. 68

9 Non Profit Hub (2005) states that policies are risk-management strategies that establish acceptable use of company accounts, shielding an employer from legal liability and protecting network security and productivity. Organisations should continually educate their employees to ensure that they comply with set policies. -, Internet- and software-usage policies are essential to every organisation, for the following reasons (Flynn, 2001): Risks abound in the electronic office. No employee is immune from electronic risks. To keep employees on track while they are online and to avoid lost productivity, workplace lawsuits, wasted employee talents, fines and, in some instances, even imprisonment. To avoid public-relations nightmares. To avoid the reach of security breaches. To prevent wastage of computer resources. The next section will be devoted to a discussion on a number of the possible pitfalls companies and their employees could encounter whilst trying to formulate, adopt, enforce and adhere to electronic-communication policies Potential claims by employees The employees in most organisations are free to use the computer systems and all the available means of communication. This scenario, however, has certain specific implications both for the employee and for the organisation, such as the possibility of legal proceedings on the grounds of infringement of privacy or copyright, discrimination, harassment and defamation and, last but not least, posing a threat to corporate intellectual assets. Following, then, a discussion on these issues Employees right to privacy Almost every organisation recognises its employees common-law right to privacy. Someone who infringes this right, however, has been loosely defined as one who intentionally intrudes, physically or otherwise, upon (the) solitude or seclusion of another, or his/her personal affairs or concerns (and one who) is subject to liability to the other for invasion of privacy, if the intrusion would be highly offensive to a reasonable person (Overly, 1999). 69

10 With Internet technologies becoming increasingly sophisticated, the issue of on-line privacy protection has gained considerable visibility as consumer advocates, public-policy makers and companies debate the best ways to protect consumer privacy while at the same time ensuring the protection of all stakeholders rights (Hill & Singh, 2003). Another contentious privacy issue is that of the unauthorised publication of content, such as the forwarding of an message without permission or its posting on the Net, where it will be available for the greater public s viewing clearly constituting an invasion of a person s right to privacy. Employees should minimise the likelihood of invasion of their privacy by adhering to the policy guidelines laid down by their organisation. Following, a few examples of such guidelines (Moghe, 2003): Management should ensure that the policy is clear, known to and understood by employees. Ideally, the policy should be linked to a screen that employees see as soon as they log onto the internal network of the organisation. The policy should be unambiguous as to what activities are permitted or not. should, for example, be used solely for business purposes, thereby ensuring that personal information never become ensconced in the organisational system. The policy should clearly set out who in the organisation is authorised to access and monitor employee content. Employees should acknowledge in writing that their computer files and messages are subject to review by authorised personnel and that they have no expectation of privacy for what they have created or received on the system. The policy should explicitly refer to the computer-security policy of the organisation, as the improper use of may pose a threat to system security, the privacy of staff members and others and the legal liability of the organisation. The policy should outline how the organisation intends to monitor or audit staff compliance with its rules relating to the acceptable usage of and Web browsing. 70

11 Labour-organisational activities Organisational computer systems allow employees to do their jobs and to communicate information effectively. Bulletin boards and Intranets represent easy ways in which to organise employees in different locations. Employees should be aware of this and other user-computer policies to address labourorganisational activities online. Organisations should also ensure that policies on use of computer systems are in place and that they restrict employees use solely to business activities Discrimination and harassment Sipior and Ward (1999) caution that although has been lauded as a wonderful means of improving personal productivity and organisational responsiveness, these benefits also hold a dark flipside for employees and employers alike, as the use of technology could provide vital information on organisational hierarchy, position and status. allows users to express themselves in a less formal environment and from a locality typically far removed from the recipient or target audience. To make matters worse, many users are under the erroneous impression that a message is removed from the system permanently as soon as it is deleted, when, in fact, most companies routinely perform system backups. Employers often have to adjudicate employee disputes arising out of inappropriate or offensive content in s. Racially discriminating or sexually orientated jokes and cartoons have already formed the bases for a number of substantial lawsuits Copyright poses mainly two potentially contentious copyright issues. Firstly, incorporating material into s without authorisation constitutes a violation of most copyright laws. Secondly, the itself is subject to copyright, with the result that copying or forwarding a message may, in fact, constitute another copyright infringement. 71

12 Copying material online such as text, sound, pictures, cartoons, jokes, movies and so forth is bound to have copyright implications. Most companies install automated programs called robots or spiders to traverse the Web looking for unauthorised copies of copyrighted works. Should an unauthorised copy be detected, the program would report the location to its owner. Copying or distributing copyrighted material without authorisation from its owner may result in substantial liability and possibly in criminal prosecution. The computer-use policy should, therefore, clearly define each employee s obligation to avoid infringement of other people s intellectual-property rights Defamation and spam and other electronic communications (such as bulletin boards and newsgroups) pose a particularly big threat with regard to defamation claims, especially since the online environment allows senders to give out defamatory statements to an audience of thousands strong in a matter of seconds. users sometimes send s when they are emotionally charged, making statements that they are bound to regret later. There are, basically, two ways in which an organisation could be found liable for defamatory statements made by employees using its e-communication systems (Overly, 1999): Agency liability employees are deemed to be representatives of their companies. This could very possibly pose a huge problem with regard to , since every employee with an account literally becomes a spokesperson for his/her company, whether he/she be authorised or not. Liability as disseminator organisations may, in their capacity of providers of computer systems, be held liable for the dissemination of defamatory material. Liability is further determined by establishing whether the organisation is a publisher or merely a distributor of such material. Spammers must bear in mind that anti-spamming laws have become focal points for many organisations, and that many online-service providers are indeed suing spammers for trespassing and infringing upon their systems. Sending unsolicited commercial s may not only violate the law but may also cause a public-relations nightmare for a company. 72

13 Employees should, therefore, comply with anti-spam laws for every jurisdiction in which they are sending or receiving Protection of corporate information and resources: trade secrets and other confidential information Trade secrets are a company s most valuable assets and must be protected, so that they are not revealed to the public or to competitors. Trade secrets consist of any information, ideas or methods that a company uses to produce a product or to render a service that gives it a distinct identity and a competitive edge. When organisational information and trade secrets are stored in a computer system, there are two primary concerns, namely that an employee would reveal (be it intentionally or inadvertently) a trade secret through an online communication (such as an , a bulletin board or a newsgroup) use online communications to steal a trade secret for his/her own financial gain. Organisations must, therefore, lay down and follow strict guidelines to control the publication of trade secrets and organisational information in s and other electronic communications. In addition, organisations must adopt policies that will serve to remind employees that it is in everyone s best interest and indeed that it is everyone s duty to protect trade secrets from unauthorised disclosure. Monitoring and surveillance technologies form part of such policies and organisations and their employees should be aware of their responsibilities and restrictions when using corporate-communication network systems. Following, a discussion on monitoring and surveillance, as well as a discussion on how these technologies could be put to use in the workplace. 4.4 Monitoring and surveillance technologies Organisations are increasingly implementing surveillance and monitoring software to avoid loss of productivity and liability against legislation, and to ensure the protection of their intellectual property. These considerations should also be integrated into corporate e-communication policies. 73

14 4.4.1 Defining monitoring and surveillance Davies (1999) defines surveillance in the workplace as the structured observation of an individual s movements and transactions. Watson (2002), in his turn, goes on to fine-tune this definition by differentiating between monitoring and actual surveillance. Overly (1999) describes monitoring as a process that is effected in three different stages: Responsive monitoring This stage of monitoring is effected in response to a particular problem or complaint; for example, when one employee informs a supervisor that his/her colleague is sending inappropriate jokes through the company s system. The employer will, in this case, monitor the implicated employee s in response to the complaint. Random monitoring This stage of monitoring is effected through random sampling of employee s to ensure that their content is in compliance with the established electronic-communication policies of the organisation in question. In the light of the fact that the volume of in even small organisations may be quite substantial, random monitoring, however, is seldom effective in detecting inappropriate or unauthorised messages. Continued monitoring This stage generates the biggest monitoring capacity, as specialised computer software is used automatically to monitor every message sent or received within an organisation. The software is highly sophisticated and is capable of detecting even a solitary instance of profanity or inappropriate language in a single message. In addition to detecting profane, sexually explicit and/or racially offensive content, the software can be configured to keep a lookout for abuse of trade secrets and other proprietary information Monitoring and surveillance in the workplace In his research, Oliver (2002) has uncovered that the practice of monitoring employee use of and the Internet in the workplace is becoming evermore popular. In today s Network Society with its enhanced technology, it is very easy for employers to carry out such pervasive surveillance of employees activities by electronic means. Such practices, however, could 74

15 have serious repercussions for employees right to privacy. As a result, a great many organisations have resorted to outsourcing these monitoring functions. Employers can, in other words, gather information on their employees by watching what they are doing during working hours, by uncovering their interests and private activities as revealed by their and Internet use, and by simply sifting through their personal electronic correspondence. Companies are continuously adding monitoring and surveillance tools to combat legal liability, reduced productivity and the threat of exposure of trade secrets and intellectual property. Hall (2004) explains that an employer could be held liable for defamatory, discriminating and sexual-harassing statements made by its employees. These problems are caused by the misuse of technology and could be very costly. Employers have to strike a balance between keeping an eye on poor performance and protecting their employees rights to privacy if monitoring policies were to be applied successfully. Employers should also bear in mind that working hours have extended for many employees, and that they are sometimes compelled to do personal business during these hours, such as, for example, shopping online. Electronic monitoring could also cause stress and create adverse working conditions, as listed by Hall (2004) below: Lack of involvement. Lack of control over tasks. Reduced task variety and clarity. Reduced supervisory support. Fear of job loss. Routine work activities. Reduced social support from peers. Hall (2004) also points out that excessive monitoring undermines staff morale, and that it could lead to job-related depression and a lack of wellbeing. Monitoring technology should, therefore, not be used to replace supervisors managerial functions, but rather to establish a principle of equal rights for both employer and employee. 75

16 4.4.3 Monitoring software Watson (2002) observes just how rapidly the market for surveillance is expanding and that, concomitant to this demand, the range of products is becoming vastly varied and sophisticated too. These tools allow the operator of an information system exactly to track where an message finds itself; from the sender s information-service provider to the recipient s Inbox Policies Watson (2002) also emphasises the rationale behind drawing up a proper policy for all electronic-communication systems, as these policies ensure the employer s position on the proper use of systems. Policies should also inform staff members as to why the organisation needs to use surveillance technology in the first place. Employers often feel that monitoring and surveillance could instil fear in and create resentment among employees, even though the majority of employees usually approve of these installations. Policies should be updated frequently not only to account for changes in the law but also to account for technological advances. Morris (2003) indicates that employers should enhance the positive capacity for increased productivity that technology has to offer without exposing themselves to a liability, and without creating a false expectation of privacy among employees archiving systems Thanks to the convenience and immediacy of technology, millions of s are sent and received by organisations daily. While most users think that the majority of s can be discarded, it is essential to keep copies of important correspondence for legal, clarification and risk-management purposes (Nieger, 2003). archival systems, therefore, need to be implemented in organisations to manage s, to avoid legal complications and to prevent overload in its users archiving challenges Roberto (2004) points out that the convenience and immediacy of make it an instant necessity for organisations, but that the storage volume needed for s represents both a challenge and a liability. Companies are fast adapting to the growing use of messaging and mailing systems, however. 76

17 While volumes continue to grow at exponential rates, the value of the technology as a business tool is being seriously compromised by lack of centralised administration and records management. Legato (2005) has identified the following business challenges that companies need to face in this regard: Storage management System administrators constantly battle with the growing volumes of , the use of to share files and users demand for maintaining online access to this volume of data. Large messaging servers have to be implemented, just to cope with the much-needed storage requirements. In addition to this are the backup costs associated with the material and time time needed to recover a mission-critical system such as has become paramount for most companies. Lastly, many corporations have placed the onus of archiving messages on the individual user, which has led to a decentralised and ultimately redundant system that does not ensure comprehensive retention of important business data. Records retention A sizeable volume of regulatory legislation (policies and laws) requires organisations to retain s and other records of business data for a set period of time. In addition, companies are increasingly adopting corporation-based policies in terms of which s are required to be retained for future reference and auditing. The requirements for maintaining electronic means of communication are becoming the norm as companies recognise the benefits they stand to derive from storing these records, as well as their hard copies. As a result, retaining messages for longer periods of time and being able quickly to search and retrieve specific records are fast becoming critical activities for most companies. Legal discovery Knowing the general difficulties of managing records, litigators have made digital information a target for discovery. In the past, companies relied on the excuse that locating information on backup tape was too costly for their organisations. Companies either relied on exhaustively restoring 77

18 system backups and searching for data, or they had to pay a large fee to outsource firms to perform the discovery operation. Today, solutions are available to make messaging-systems data readily available and searchable, all within reasonable effort and time. Next, a discussion on archiving systems and software solutions, highlighting the benefits to be derived from these systems and solutions Archiving systems is the key communication tool of a business and IT managers are overburdened by requests to access and restore s. CEOs are concerned with the safety requirements to store important s while maintaining accountability for corporate communication. In order to manage storage costs while ensuring corporate guidelines for electronic correspondence, a new approach in management is required by organisations. This will also reduce business risks and improve the efficiency of everyday business. Roberto (2004) explains the benefits that a proper archiving system can deliver: Immediate searches and delivery. s can be checked and retrieved, and their content structured. It ensures compliance with laws and regulations. It reduces the size of databases. It improves the performance and efficiency of the system. Users and administrators are less overburdened. The use of archiving software is growing exponentially, fuelled by the explosion of messaging and other electronic communications, as well as by concerns about regulatory compliance and other factors (eweek, 2005). The next section will be devoted to a closer look at some archiving systems that can be used by organisations with great success archiving software Following, a discussion on some of the many software solutions to archiving. 78

19 Legato s Xtender archival system Xtender ( EX ) is an example of software that can be used to solve some of these managerial problems. Legato (2005) explains that EX is a centralised data-storage and -retrieval system that makes enterprise easier to administer and use. It automatically moves data off the message server into an archiving system, thus capturing and indexing all incoming and outgoing s. In addition, instant messaging ( IM ) can be captured and stored in the system. EX provides fast access to stored s and IMs, and allows for quick restoration after virus attacks. Captaris s Exchange Archive Link Schwarts (2005) indicates that the business-information vendor Captaris has introduced a new version of its archiving tool that is more scalable and integratable with content-management product. The archiving tool scales up to tens of thousands of mailboxes vastly more than the original version, which was targeted at organisations with fewer than mailboxes. It also boasts a plain-english rules engine, making it easier for administrators to formulate archiving rules. EVault ProMail EVault ProMail allows customers, such as broker-dealers, to ensure that their communications be maintained in an easily accessible archive, compliant with regulatory requirements, without having internally to manage a complex and costly infrastructure. Some of the benefits to be derived from using this system are as follows (EVault, 2005): Customisable and enforceable rules that allow the user to modify the rules with compliance-specific keywords and phrases. Flexible administration, supporting multi-tiered and IM monitoring for corporate and public networks. Automatic updates, alerting administrators when rules should be changed or reviewed. Complete message encryption and security access to archived messages. Compliant archiving, ensuring regulatory governing storage and retrieval of s and IMs. 79

20 EVault ProMail supports most of the systems, including Microsoft Exchange, Lotus Notes/Domino and Novell GroupWise, as well as a variety of IM platforms, including AOL, MSN and Yahoo! GFI MailArchiver GFI MailArchiver provides easy-to-use corporate archiving, allowing the user to archive all internal and external mail into a single database. This allows the organisation to provide users with easy, centralised access to past s via a Web-based search interface, whilst adhering to regulatory requirements. Following, some of its benefits (Anon. J, 2005): Provides the end-user with a single, Web-based location in which to search all past mail. Increases server performance and facilitates backups and restoration. It significantly reduces storage requirement for (up to 80%). It is clear that has to be managed correctly to be in sync with corporate policies and legislation. Archiving solutions can assist organisations and their employees at becoming compliant, thus ensuring better management. 4.6 Conclusion ICT has enabled and restructured new economic and business practices across the globe, and has proceeded to run governments and engage political and social interaction. Thanks to their vastly improved access to information and knowledge, people are empowered to achieve their development goals and, through improved electronic communications, to help create and develop a more prosperous world (Utsumi, 2005). As discussed in the pervious chapter, electronic communication flows through different channels, including those of broadcasting, telephony and the Internet. The Internet has enabled many users to gain access to electronic mail. , in its turn, allows users quickly and effectively to communicate with colleagues, business associates, friends and family members. This chapter has been devoted to an investigation into the effects of overload on users and into the various ways in which this phenomenon could and should be managed by organisations. In so doing, it has been established that overload is caused mainly by the improper use of systems, a 80

21 lack of discipline in individuals and by spammers. The investigation also served to uncover its many implications for users and how the implementation of management systems could benefit organisations. Financial institutions are the leading investors in the IT industry, and need upto-date technology and communication media to disseminate and exchange information among and with customers, colleagues and competitors (Burger, 2005). In the next chapter, an investigation will be launched into information communication and related technologies of the financial sector of South Africa, culminating in an in-depth look at Standard Bank s electronic communications with its employees and customers. 81

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction 1.1 Background to the research project Information overload as a phenomenon has been in existence for some decades now. Collie (2005), for instance, claims that we are being bombarded

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

Investigating e-mail overload in the South African banking industry

Investigating e-mail overload in the South African banking industry Peer Reviewed Article Vol.9(3) September 2007 Investigating e-mail overload in the South African banking industry E. Burger Centre for Information and Knowledge Management University of Johannesburg Johannesburg,

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

ICT POLICY AND PROCEDURE

ICT POLICY AND PROCEDURE ICT POLICY AND PROCEDURE POLICY STATEMENT St Michael s College regards the integrity of its computer resources, including hardware, databases and software, as central to the needs and success of our day-to-day

More information

INTERNET, E-MAIL USE AND

INTERNET, E-MAIL USE AND INTERNET, E-MAIL AND TELEPHONE USE AND MONITORING POLICY Originated by: Customer Services LJCC: 10 th April 2008 Full Council: June 2008 Implemented: June 2008 1.0 Introduction and Aim 1.1 The aim of this

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

Email Archiving, Retrieval and Analysis The Key Issues

Email Archiving, Retrieval and Analysis The Key Issues Email Archiving, Retrieval and Analysis The "If you are going to find a smoking gun, you will find it in email." Abstract Organisations are increasingly dependent on email for conducting business, internally

More information

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT. Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together

More information

Advice leaflet Internet and e-mail policies

Advice leaflet Internet and e-mail policies Advice leaflet Internet and e-mail policies Introduction Electronic communications have revolutionised business communications, although the huge increase in use has taken some organisations by surprise.

More information

Acceptable Use of Information Technology Policy

Acceptable Use of Information Technology Policy Acceptable Use of Information Technology Policy Date created: January 2006 Updated Review date: April June 2008 Review date: Oct Dec 2009 Introduction VAW provides IT facilities for promoting its charitable

More information

Code - A Date Approved: July 24/01

Code - A Date Approved: July 24/01 Page 1 of 10 Date Last Revision: Feb 12/08 POLICY STATEMENT AND PURPOSE The County of Elgin provides employees, elected officials, and other organizations and individuals with access to computer and network

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information

AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Executive Director (AK) [J50]

AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - EMAIL POLICY Executive Director (AK) [J50] AGENDA ITEM NO 14 RECOMMENDATION FROM STANDARDS COMMITTEE MEETING OF 12 MAY 2009 - "EMAIL POLICY" Committee: Policy and Resources Date: 23 rd June 2009 Author: Executive Director (AK) [J50] 1.0 ISSUE 1.1

More information

With the increasing popularity of social media you need a Social Media Policy to protect your company.

With the increasing popularity of social media you need a Social Media Policy to protect your company. Dear Reader, With the increasing popularity of social media you need a Social Media Policy to protect your company. It can become your biggest nightmare when employees distribute information that s not

More information

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the

More information

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY

TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY Council Resolution No 313/03 adopted at the Ordinary Meeting of Council on 19 August 2003. PURPOSE

More information

ICT Safe and Acceptable Use Policy for Students

ICT Safe and Acceptable Use Policy for Students ICT Safe and Acceptable Use Policy for Students CONTENTS 1. DEFINITION, POLICY & RESPONSIBILITY... 3 2. NETWORK... 3 3. INTERNET... 3 4. EMAIL... 4 5. COPYRIGHT AND PLAGIARISM... 5 6. BACKUP RESPONSIBILITIES...

More information

If you have any questions about any of our policies, please contact the Customer Services Team.

If you have any questions about any of our policies, please contact the Customer Services Team. Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting

More information

Employee Internet Usage February 15, 2007

Employee Internet Usage February 15, 2007 Employee Internet Usage February 15, 2007 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing Office

More information

Internet, Social Media and Email Policy

Internet, Social Media and Email Policy West Lothian Council Internet, Social Media and Email Policy Approved : Council Executive 25 June 2012 INTERNET, SOCIAL MEDIA AND E-MAIL POLICY (Covering all Employees) CONTENTS 1. POLICY STATEMENT...

More information

Human Resources Policies and Procedures

Human Resources Policies and Procedures SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media

More information

R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS

R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS R 3321/Page 1 of 7 R3321 AND RESOURCES BY TEACHING STAFF MEMBERS The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes

More information

Do you have a private life at your workplace?

Do you have a private life at your workplace? Do you have a private life at your workplace? Privacy in the workplace in EC institutions and bodies Giovanni Buttarelli In the course of his supervisory activities, the EDPS has published positions on

More information

Internet, Social Networking and Telephone Policy

Internet, Social Networking and Telephone Policy Internet, Social Networking and Telephone Policy Contents 1. Policy Statement... 1 2. Scope... 2 3. Internet / email... 2 4. Social Media / Social Networking... 4 5. Accessing the internet, email or social

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

Guidelines on developing a policy for managing email

Guidelines on developing a policy for managing email Guidelines on developing a policy for managing email Crown copyright 2004 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government

More information

Social Media. Scope. Computer Use Employee Code of Conduct Privacy Emergency Management Plan Communications Strategy Community Engagement Strategy

Social Media. Scope. Computer Use Employee Code of Conduct Privacy Emergency Management Plan Communications Strategy Community Engagement Strategy Social Media Responsible officer: Director Community and Corporate Services Key Result Area: Governance and Decision Making Document type: Policy Reference: 10/01/0004 Approved by: Council Date approved:

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

The College ofBergen Online - Acceptable Use and Disposal

The College ofBergen Online - Acceptable Use and Disposal Acceptable Use of Information Technology Policy Bergen Community College reserves the right to monitor its information technology resources and telecommunications network to protect the integrity of its

More information

INTERNET ACCEPTABLE USE POLICY

INTERNET ACCEPTABLE USE POLICY INTERNET ACCEPTABLE USE POLICY 1 Introduction..3 Background..3 Objectives of this Policy...3 Application of this Policy..4 References and Related Legislation and Regulations..4 Policy Statement.4 Methods

More information

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy

La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology and Internet Use Policy LCUSD Personnel Use of Technology Regulations (AR 4163.4) Updated 08/21/08 p. 1 of 5 La Cañada Unified School District Personnel Use of Technology Regulations (AR 4163.4) Also known as the Staff Technology

More information

Virginia Commonwealth University Police Department

Virginia Commonwealth University Police Department Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

Email & Internet Policy

Email & Internet Policy Email & Internet Policy Use of email system and internet services Current Document Status Version V0.2 Approving body Acorn Academy Cornwall Date 11 June 2015 Date of formal approval (if applicable) Responsible

More information

Archiving Strategies for E-mail in the Enterprise

Archiving Strategies for E-mail in the Enterprise Archiving Strategies for E-mail in the Enterprise A By Introduction E-mail has become a ubiquitous form of electronic communication. For most businesses, e-mail is the standard mode of communication. According

More information

THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY

THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY Version Author Date Approved by Board 2009-1 Gillian Kirkup 24 March 2010 Page 1 of 8 THE RICE MARKETING BOARD FOR

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

Organizational Policy

Organizational Policy Approved by: City Manager/General Managers Report No.: n/a Effective: January 1, 2004 Reviewed: July 25, 2012 Amended: July 25, 2012 Next Review: July 25, 2013 Note: Purpose: on The purpose of this policy

More information

Sexual Harassment. Managers and supervisors can be named in that complaint if they failed to prevent or respond to the situation.

Sexual Harassment. Managers and supervisors can be named in that complaint if they failed to prevent or respond to the situation. The Internet at Work: An Employment Law Danger Zone By: Lauren M. Bernardi Internet and e-mail access at work have unquestionably created new and difficult challenges for managers and employers. Consider

More information

E-Mail Management Policy

E-Mail Management Policy Information Management Standards & Procedures E-Mail Management Policy Appendices: A. Decision Matrix For Email Records Management 1 st December 2009 Document Version: 1.0 Page 1 of 14 Contents 1.0 Document

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2

More information

INTERNET AND EMAIL POLICY

INTERNET AND EMAIL POLICY Author: Computer Services Manager Valid Until: 25/02/16 Category: Public Impact Assessed: Ref: 66 Assessed: 05/03/08 10/02/10 30/01/11 25/02/15 INTERNET AND EMAIL POLICY 1 SCOPE This Internet/Email policy

More information

AUP COMPLIANCE. Auditing the AUP compliance. by using a non-invasive surveillance solution.

AUP COMPLIANCE. Auditing the AUP compliance. by using a non-invasive surveillance solution. AUP COMPLIANCE Auditing the AUP compliance by using a non-invasive surveillance solution. About Acceptable Use Policy Today, performing at work without a computer is impossible. Besides using computers

More information

Integrated email archiving: streamlining compliance and discovery through content and business process management

Integrated email archiving: streamlining compliance and discovery through content and business process management Make better decisions, faster March 2008 Integrated email archiving: streamlining compliance and discovery through content and business process management 2 Table of Contents Executive summary.........

More information

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011 West Lothian College E-Mail and Computer Network Responsible Use Policy September 2011 Author: Steve Williams Date: September 2011 Agreed: Computer Network & Email Policy September 2011 E-Mail and Computer

More information

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Use of the Internet and E-Mail Policy

Use of the Internet and E-Mail Policy Use of the Internet and E-Mail Policy This procedural documentsupersedes : Use of the Internet and E-Mail Policy CORP/EMP 16 v.4 Name and title of author/reviewer Samantha Francis HR Advisor Date revised

More information

How to Monitor Employee Web Browsing and Email Legally

How to Monitor Employee Web Browsing and Email Legally WHITEPAPER: HOW TO MONITOR EMPLOYEE WEB BROWSING AND EMAIL LEGALLY How to Monitor Employee Web Browsing and Email Legally ABSTRACT The Internet and email are indispensable resources in today s business

More information

How To Use A College Computer System Safely

How To Use A College Computer System Safely 1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.

More information

REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS

REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS R 2361/Page 1 of 7 R 2361 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology

More information

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and

More information

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy

Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Faculty/Staff/Community Mountain Home School District Computer and Network Appropriate Use Policy Mountain Home School District is responsible for securing its network and computer systems against unauthorized

More information

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for

More information

TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures

TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures A. INTERNET ACCEPTABLE USE POLICY OF THE TAUNTON PUBLIC SCHOOLS I. Mission Statement: Academic

More information

Chicago State University Computer Usage Policy

Chicago State University Computer Usage Policy Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services

More information

SOCIAL MEDIA POLICY. Introduction

SOCIAL MEDIA POLICY. Introduction Introduction Throughout this Policy, the words Translink Company and/or the Group refer to all corporate entities under the ownership of the Northern Ireland Transport Holding Company (NITHC). This includes

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

www.thalesgroup.com Business Ethics Conduct Guide Best practice guidelines for using e-mail

www.thalesgroup.com Business Ethics Conduct Guide Best practice guidelines for using e-mail www.thalesgroup.com Business Ethics Conduct Guide Best practice guidelines for using e-mail Contents PREFACE...3 DID YOU KNOW?...4 Make better use of time... 4 Manage the mass of information... 5 Avoid

More information

In-House Vs. Hosted Email Security. 10 Reasons Why Your Email is More Secure in a Hosted Environment

In-House Vs. Hosted Email Security. 10 Reasons Why Your Email is More Secure in a Hosted Environment In-House Vs. Hosted Email Security 10 Reasons Why Your Email is More Secure in a Hosted Environment Introduction Software as a Service (SaaS) has quickly become the standard delivery model for critical

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer 1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright

More information

Email Policy and Code of Conduct

Email Policy and Code of Conduct Email Policy and Code of Conduct UNIQUE REF NUMBER: CCG/IG/011/V1.2 DOCUMENT STATUS: Approved by Audit Committee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT HISTORY

More information

Angard Acceptable Use Policy

Angard Acceptable Use Policy Angard Acceptable Use Policy Angard Staffing employees who are placed on assignments with Royal Mail will have access to a range of IT systems and mobile devices such as laptops and personal digital assistants

More information

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all

More information

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy

1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy 1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited

More information

Computer Network & Internet Acceptable Usage Policy. Version 2.0

Computer Network & Internet Acceptable Usage Policy. Version 2.0 Computer Network & Internet Acceptable Usage Policy Version 2.0 April 2009 Document Version Control Version Date Description 1.0 Sept 2003 Original Version (adopted prior to establishment of BoM) 2.0 March

More information

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy )

ITU-10002 Computer Network, Internet Access & Email policy ( Network Access Policy ) ITU-10002 Computer Network, Internet Access & Email policy South Norfolk Council IT Unit Documentation www.south-norfolk.gov.uk Page : 2 of 8 Summary This policy informs all users about acceptable use

More information

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses White Paper How to Effectively Provide Safe and Productive Web Environment for Today's Businesses Table of Content The Importance of Safe and Productive Web Environment... 1 The dangers of unrestricted

More information

Data Protection Division Guidance Note Number 10/08

Data Protection Division Guidance Note Number 10/08 Gibraltar Regulatory Authority Data Protection Division Data Protection Division Data Protection Division Guidance Note Number 10/08 Monitoring of Staff Guidance Note Number 10/08 Issue Date: 06/11/2008

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

WHITEPAPER 5 Reasons HR Professionals Are Adopting SaaS Email Image Filtering

WHITEPAPER 5 Reasons HR Professionals Are Adopting SaaS Email Image Filtering WHITEPAPER 5 Reasons HR Professionals Are Adopting SaaS Email Image Filtering Litigation for sexual harassment resulting from inappropriate exposure to pornography can have a massive impact on brands,

More information

ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY

ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY ELECTRONIC COMMUNICATIONS: E-MAIL / INTERNET POLICY 1 CONTENTS: 1. INTRODUCTION 2. APPLICABILITY 3. MANAGEMENT RIGHT TO ACCESS INFORMATION 4. PERSONAL USE OF E-MAIL & INTERNET FACILITIES 5. FORBIDDEN CONTENT

More information

LOTUS NOTES USER PROTOCOLS

LOTUS NOTES USER PROTOCOLS LOTUS NOTES USER PROTOCOLS Introduction From monitoring how South Yorkshire Police staff make use of the software, it became apparent that there was a need for a set of regulatory instructions to supplement

More information

Email Services Policy

Email Services Policy Email Services Policy CONTENTS Page 1 Introduction 3 2 Scope 3 3 Review and Evaluation 3 4 General Principles 4 5 Responsibilities 4 6 Business Use and Continuity 4 7 Personal Use 6 8 Managing Email Messages

More information

Email and IM Archiving

Email and IM Archiving Sprint Message Archive Email and IM Archiving Proven Strategies for the Enterprise 2 Sprint Message Archive Executive Summary Email has become a ubiquitous form of electronic communication. For most businesses,

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal

More information

Southwest Texas Telephone Company (SWTTC) Acceptable Use Policy for Asynchronous Digital Subscriber Line (ADSL)/Internet Customers

Southwest Texas Telephone Company (SWTTC) Acceptable Use Policy for Asynchronous Digital Subscriber Line (ADSL)/Internet Customers Southwest Texas Telephone Company (SWTTC) Acceptable Use Policy for Asynchronous Digital Subscriber Line (ADSL)/Internet Customers Introduction When you open your SWTTC ADSL/Internet account, you become

More information

Acceptable Use Policy - NBN Services

Acceptable Use Policy - NBN Services OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 care@oasistelecom.com.au www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:

More information

The Resource Newsletter for Home and Hospice Care March 2010. Home Care The Law

The Resource Newsletter for Home and Hospice Care March 2010. Home Care The Law The Resource Newsletter for Home and Hospice Care March 2010 & Home Care The Law LEGAL HOT TOPIC: Employee Monitoring: Know the Risks or Risk Major Liability by Robert W. Markette, Jr., CHC. This issue

More information

Riverside Community College District Policy No. 3720 General Institution

Riverside Community College District Policy No. 3720 General Institution Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall

More information

Outbound Email Security and Content Compliance in Today s Enterprise, 2005

Outbound Email Security and Content Compliance in Today s Enterprise, 2005 Outbound Email Security and Content Compliance in Today s Enterprise, 2005 Results from a survey by Proofpoint, Inc. fielded by Forrester Consulting on outbound email content issues, May 2005 Proofpoint,

More information

FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY

FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY FRESNO COUNTY EMPLOYEES' RETIREMENT ASSOCIATION INTERNET AND E-MAIL USAGE POLICY Effective August 24, 2004 Overview: The Fresno County Employees Retirement Association (FCERA) provides access to the Internet

More information

Email policy and practice

Email policy and practice Email policy and practice This policy applies to all staff (including agency workers, casual and temporary staff), visitors, contractors, students, alumni and researchers of Anglia Ruskin University, and

More information

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014 WORTHING COLLEGE STUDENT IT SECURITY POLICY October 2014 Policy name Student Information Technology Security Policy Author: Lesley May/Michael Perry Approved by SLT October 2014 Approved by Corporation

More information