www.thalesgroup.com Business Ethics Conduct Guide Best practice guidelines for using e-mail



Similar documents
UNIVERSITY OF ST ANDREWS. POLICY November 2005

USE OF INFORMATION TECHNOLOGY FACILITIES

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

Acceptable Use of ICT Policy For Staff

Business Ethics Conduct Guide User guide on Ethics Alert

Policy and Code of Conduct

Acceptable Use of ICT Policy. Staff Policy

Beth Hennigan. 1 P a g e

DON T BE FOOLED BY SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam FREE GUIDE. December 2014 Oliver James Enterprise

EDEXCEL FUNCTIONAL SKILLS ICT. Study Module 8. Using ICT to communicate

Fighting spam in Australia. A consumer guide

COMPUTER USAGE -

Policy. Version: 1.1. Date ratified: February 2014 Name of originator /author (s): Responsible Committee / individual:

ITU Computer Network, Internet Access & policy ( Network Access Policy )

Policy For Staff and Students

How To Use A College Computer System Safely

Guidelines on developing a policy for managing

COLLEGE POLICY MANUAL

Acceptable Use of Information Technology Policy

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Information Security Code of Conduct

If you have any questions about any of our policies, please contact the Customer Services Team.

Etiquette (Netiquette) Guidance

Infocomm Sec rity is incomplete without U Be aware,

Top tips for improved network security

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

The Bishop s Stortford High School Internet Use and Data Security Policy

Sibford School Student Computer Acceptable Use Policy

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No

INFORMATION SECURITY GUIDE FOR STAFF

FILTERING FAQ

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

How To Protect Decd Information From Harm

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

region16.net Acceptable Use Policy ( AUP )

A Guide to Information Technology Security in Trinity College Dublin

INTERNET, USE AND

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0

Service Schedule for Business Lite powered by Microsoft Office 365

Information Governance Framework. June 2015

Internet, and SMS Texting Usage Policy Group Policy

More Details About Your Spam Digest & Dashboard

Services Policy

Acceptable Use and Publishing Policy

How to Manage . Guidance for staff

ModusMail Software Instructions.

Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP) School Computing

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

What Spammers Don t Want You To Know About Permanently Blocking Their Vicious s

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Acceptable Use Policy ("AUP")

NC DPH: Computer Security Basic Awareness Training

DATA AND PAYMENT SECURITY PART 1

Acceptable Use Policy

Version: 2.0. Effective From: 28/11/2014

Protecting your business from fraud

Learn to protect yourself from Identity Theft. First National Bank can help.

Dene Community School of Technology Staff Acceptable Use Policy

Microsoft Outlook 2010 contains a Junk Filter designed to reduce unwanted messages in your

Data Protection and Privacy Policy

LCC xdsl Usage Policy

So the security measures you put in place should seek to ensure that:

Transcription:

www.thalesgroup.com Business Ethics Conduct Guide Best practice guidelines for using e-mail

Contents PREFACE...3 DID YOU KNOW?...4 Make better use of time... 4 Manage the mass of information... 5 Avoid a sense of urgency... 6 Avoid e-mail dependency... 6 Improve the quality of your communication... 7 Avoid conflicts... 8 Protect against malicious e-mails... 8 TOOLBOX...10 Guidelines for the proper use of NuCo... 10 Guide to basic functions... 10 Guide to advanced functions... 10 Thales University elearning portal... 10 FURTHER INFORMATION...11 France... 11 Germany... 12 United Kingdom... 12 United States... 13 Australia... 13 Other regulations... 13 Thales IT Charter and specific instructions... 14 TALK TO US...15 THALES Business Ethics Conduct Guide Best practice guidelines for using e-mail

33 PREFACE Preface These guidelines are an invitation to stand back and think about some of our daily routines and to see if there are things we could change or improve. E-mail has come to play an important role in the way we interact with others. It can sometimes be invasive, and we don t always use it as responsibly as we could! Some of the ideas in these guidelines may sound obvious, but they are here simply to remind us all to think twice about how we interact with other people. Dominique Lamoureux, Vice-President, Ethics and Corporate Responsibility This guide has been developed in close collaboration with the following Corporate Departments: Communications, Human Resources, Security, Internal Audit, Information Systems. CHORUS REFERENCE - 87205444-GOV-GRP-EN-001- Creation December 2012

4 DID YOU KNOW? Inappropriate use of e-mail can cause annoyance or inconvenience, but this can be avoided. By raising a few issues, this guide aims to improve your understanding of e-mail and help you make better use of it in your daily work. Make better use of time E-mail is a quick way to communicate. You can send a message to one person or as many people you like, whenever necessary, without needing to go anywhere or wait until they are free. However, the alltoo-familiar build-up of messages in people s inboxes can cancel out the time savings. Use the e-mail tool s built-in functions to sort and archive your messages every day and housekeep your mailbox so you can find things easily. Be specific in your subject lines, because this will help your addressees to manage their mailboxes as well. THALES Business Ethics Conduct Guide Best practice guidelines for using e-mail

5 Manage the mass of information With the widespread use of e-mail, the volume of information exchanged every day has also increased. This can lead to information overload and incomprehension. To avoid this, ask yourself about the suitability of the channel of communication used. E-mail is not always the best way to communicate. A telephone call or face-to-face meeting may be more appropriate. Similarly, avoid sending too much information at the same time, or choose recipients on a needto-know basis, rather than bulk mailing. DID YOU KNOW? Also remember that using email does have an environmental cost and the more email we send, the higher the cost! In a company with 100 employees, for example, a year worth of email traffic has about the same carbon footprint as flying from Paris to New York and back 13 times! This is due to the electricity needed to power the servers that send and store the messages. Here are three ways we can reduce the environmental impact of our email usages: limit the number of recipients: for example, do not use Reply All unless strictly necessary. reduce the size of each email: include thumbnails instead of full-size pictures, and send a link (URL) instead of attaching a document if possible. use text instead of HTML. CHORUS REFERENCE - 87205444-GOV-GRP-EN-001- Creation December 2012

6 Avoid a sense of urgency DID YOU KNOW? E-mail boosts productivity, but inappropriate use can cause stress for the people on the receiving end. An e-mail can give the impression that your request is urgent and must be dealt with immediately. Plus, if you e-mail people during evenings or weekends, it can encourage or oblige them to respond outside their normal working hours. Such practices have been condemned in courts of law. Tips for avoiding a sense of urgency: choose the best time to send your message and / or specify when you need a response. if a message is urgent, state this clearly in the subject line or body of the message, or use the important / priority / urgent indicator in your e-mail tool. However, urgent messages should be the exception, not the rule! limit when and where you access your mailbox (see below). Avoid e-mail dependency E-mail is so useful and compatible with company 3G laptops, smartphones, pushmail devices, etc. that it can be used almost exclusively, to the detriment of other tools, creating a degree of dependence and a willingness (or even perceived need) to be reachable at all times. As outlined above, matters are even worse when people are receiving work e-mails outside normal work hours. For this reason, it is important to set boundaries on when you are available or can be reached, particularly during meetings and periods of annual leave. THALES Business Ethics Conduct Guide Best practice guidelines for using e-mail

7 Try to limit how accessible you are: when away on leave, activate the out-of-office message function, which automatically replies to anyone who e-mails you, telling them you are unavailable and who to contact if their request is urgent. don t check your messages during meetings! To reduce your dependence, you can also limit pushmail (which automatically pushes messages from the mail server to your mobile device), or get your smartphone to sync messages at regular intervals instead of immediately. DID YOU KNOW? Improve the quality of your communication E-mail makes it easier to contact people and allows more frequent communication, but quality of content tends to suffer. If we re not careful, our exchanges can become depersonalised and less engaging and meaningful. Obviously you can t say everything in an e-mail, but there s no need to damage a relationship! Simply identifying the person you are e-mailing at the start of the message, identifying yourself by using a signature at the end for example, and personalising the content of your message will help improve the quality of your communications. Always ask yourself whether e-mail is the most appropriate form of communication in that particular situation. Excessive use of e-mail for general communications can make the people on the receiving end lose interest and motivation. Taking the time to meet your teams, encouraging them face to face, responding to their e-mails and giving them more autonomy are just some of the ways to re-motivate them. CHORUS REFERENCE - 87205444-GOV-GRP-EN-001- Creation December 2012

8 Avoid conflicts DID YOU KNOW? E-mails can be misinterpreted, resulting in misunderstandings and conflicts. They can fire up emotions and lead to abusive behaviour. People may feel at liberty to do / say more from behind their screens than they would if they were face to face with the person at the other end. Be careful about what you put in your e-mails and how you put it. Don t reply all when you only need to reply to the person concerned it limits the number of people receiving any personal or contentious information. The best way to defuse a conflict is talking face to face. Protect against malicious e-mails Because e-mail can be sent quickly and easily to any number of people at the same time, it lends itself to abuse. Phishing (1), spam and e-mails containing viruses are just three of the dangers awaiting unsuspecting users. It is therefore important to recognise the risks and deal with them effectively: Spam: unsolicited messages, usually advertising, sent indiscriminately and often repeatedly to huge numbers of people whose e-mail addresses have been harvested without their consent. The best advice is to never respond to such messages, but simply delete them. (1) Technique used by fraudsters to extract personal data and steal people s identities. THALES Business Ethics Conduct Guide Best practice guidelines for using e-mail

9 Phishing: method based on e-mails purporting to be from banks, credit card companies and other reputable financial organisations, designed to trick unsuspecting users into disclosing confidential information. Remember, legitimate financial partners never send this type of e-mail. So treat any such messages with caution and suspicion, particularly if they ask for confidential details. Also, never click on a link in an e-mail which looks suspicious. Viruses: code carried by certain e-mails, which installs itself on your computer as soon as you open a contaminated file attachment or connect to a contaminated website, then executes its payload to destroy certain file types on your hard drive or spy on your computer to harvest and export confidential information. DID YOU KNOW? Beware of any e-mail that arrives from an unknown source, or that looks strange or contains anything strange even if it appears to come from a familiar address. The virus protection installed on your Thales computer is vital, but it may not be effective against unknown malware (2). These guidelines are not intended to restrict the way that e-mail is used. They are recommendations based on broad experience that have proven useful in the past and should help us to make the most of e-mail as a quick and efficient way to communicate. (2) Malicious software, designed to harm computers and networks, without the knowledge or consent of the infected user. CHORUS REFERENCE - 87205444-GOV-GRP-EN-001- Creation December 2012

10 More practical recommendations for Thales employees on the use of e-mail are available on the Group IT Department intranet site. TOOLBOX Guidelines for the proper use of NuCo Recommendations to improve communications using the NuCo system, to be read in conjunction with this guide. http://intranet.corp.thales/isp/pub/ Reglesdebonusage_en.cfm?intralang=en Guide to basic functions A quick-start guide to the basics of these various tools, designed to get you up and running. http://intranet.corp.thales/isp/pub/ nuco_user_guide_basic_en.cfm?intralang=en Guide to advanced functions More comprehensive information about organising meetings, managing shared calendars and other more advanced functions. http://intranet.corp.thales/isp/pub/ nuco_user_guide_advanced_en.cfm?intralang=en Thales University elearning portal Email best practices are outlined in the «Communicating powerfully by email» module. http://thales.lms.crossknowledge.com/candidat/ product_sheet.php?report_id=1368139 THALES Business Ethics Conduct Guide Best practice guidelines for using e-mail

11 Rules already exist for the use of e-mail but they vary from country to country and operate at several different levels. At national level, the use of e-mail is subject to a legal framework, which varies from one country to another; list of applicable regulations in selected countries at time of publication. France Electronic messages can be recognized by French courts as a legitimate form of evidence, if the part which calls upon them had access there in a regular way. Personal e-mails sent from a work mailbox are tolerated to a certain extent, provided they do not affect people s work, do not reflect negatively on the company s reputation and do not disrupt the operation of its information systems. If you want your correspondence to be considered private, you must clearly state in the subject line that such e-mails are personal or private in nature. In your absence, the company has no right to access personal e-mail folders or messages, provided they are marked as such. In any event, only the IT department would be able to access them. FURTHER INFORMATION CHORUS REFERENCE - 87205444-GOV-GRP-EN-001- Creation December 2012

12 At Thales, employees working in the defence sector are required to comply with national security laws and regulations. Any breaches may be subject to prosecution. These rules stipulate, among other things, that no classified defence information may be transmitted by e-mail. For sensitive but unclassified information or specific information of a strictly national nature, refer to the instructions available on the Legifrance website (see link below) or contact the person responsible for security at your site. http://www.legifrance.gouv.fr/affichtexte.do?cid Texte=JORFTEXT000024892134&fastPos=1&fast ReqId=275001272&categorieLien=cid&oldAction= rechtexte Germany FURTHER INFORMATION Companies that allow their employees to use their work mailboxes for private purposes cannot monitor the content of any such messages unless an employee is specifically suspected of a serious criminal offence. Rules on the appropriate use of the company e-mail system must be approved by the works council in an agreement. United Kingdom Employees are entitled to a private family life. In this respect, they may engage in a reasonable amount of private correspondence at work, particularly by e-mail. However, the law protects employers and allows them to monitor employee e-mails. Misuse of e-mail can result in dismissal. THALES Business Ethics Conduct Guide Best practice guidelines for using e-mail

13 United States Private e-mails are not considered confidential when they are sent from a work mailbox. Legal rulings have established that employees do not have a reasonable expectation of privacy at their place of work. However, individual employers may decide otherwise, in which case they must specify their policy in writing. Australia As in the United States, Australian law does not prevent a company from monitoring employee e-mails, if the company owns the server. The workplace is considered a public place, but companies must inform employees about the specific types of monitoring in place. Other regulations In the Group s other countries of operation, local regulations are likely to be different from those described above, particularly in the area of national defence. It is important to be aware of them and refer to them whenever necessary. FURTHER INFORMATION CHORUS REFERENCE - 87205444-GOV-GRP-EN-001- Creation December 2012

14 At Group level, the Thales IT Charter provides a framework and best practice recommendations for the use of information and communication systems across the organisation, including the use of e-mail. In France, infringement of this charter can lead to sanctions. The Charter is available on intranet sites Information Systems and Chorus 2.0. The Charter is designed to be used in conjunction with specific instructions relating to: Information sensitivity Thales has determined degrees of sensitivity for confidential information, with corresponding procedures to be followed whenever such information is sent by e-mail. These procedures are available on Chorus 2.0. http://chorus2-mod.corp.thales/modulo/webservice? database=chorus2p&servicename=fileget&number= GRP/ORGA/01053 FURTHER INFORMATION Security Specific security tools and resources to protect the information system are available to users. They are available on the intranet and must be used. http://intranet.corp.thales/isp/pub/referential_ en.cfm?&page_1360=1&y=0&intralang=en Export control for technical data http://intranet.corp.thales/export-control/pub/ index_en.cfm?&intralang=en THALES Business Ethics Conduct Guide Best practice guidelines for using e-mail

15 Talk to us... For more information, details or advice, please contact: Ethics and Corporate Responsibility Department: ethics.cr@thalesgroup.com + 33 (0)1 57 77 82 07 TALK TO US CHORUS REFERENCE - 87205444-GOV-GRP-EN-001- Creation December 2012

This document is printed on recycled paper Ethics and Corporate Responsibility Department 45 rue de Villiers 92526 Neuilly-sur-Seine Cedex France www.thalesgroup.com Réalisation : Zao+Stratécréa - Shutterstock