COLLINS CONSULTING, Inc.



Similar documents
Assistant Director of Facilities

Workplace Policies. Computer Software (Unauthorized Copying)

Human Resources Policy and Procedure Manual

LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy

ELECTRONIC COMMUNICATIONS: / INTERNET POLICY

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

The City reserves the right to inspect any and all files stored in private areas of the network in order to assure compliance.

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES

Acceptable Use Policy

c. Require or Request Photos of Subscriber f. Allow Subscribers Access to Other Subscriber Information

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

INTERNET, ELECTRONIC DEVICE, AND SOCIAL MEDIA USAGE POLICY FOR STAFF (Adopted 8/18/14, Revised 2/2/15)

DIOCESE OF DALLAS. Computer Internet Policy

COMPUTER NETWORK AGREEMENT FORM

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY

1. Computer and Technology Use, Cell Phones Information Technology Policy

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM

Technology Department 1350 Main Street Cambria, CA 93428

REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

Pacific Northwest University of Health Sciences

TITLE: INFORMATION SYSTEMS RESOURCES NUMBER: PRO REFERENCE: Board Rule 2.16 PAGE 1 OF 6

13.19 ETHICS REPORTING POLICY AND PROCEDURE

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES

Delaware State University Policy

R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS

The Internet and 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

City of Venice Information Technology Usage Policy

Information Security and Electronic Communications Acceptable Use Policy (AUP)

JHSPH Acceptable Use Policy

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

ACCEPTABLE USE POLICY

Practice Resource. Sample internet and use policy. Foreword. Policy scope. By David J. Bilinsky 1

COMPUTER USAGE -

Pierce County Policy on Computer Use and Information Systems

USE OF INFORMATION TECHNOLOGY FACILITIES

Chatham County Schools Network Acceptable Use Policy Agreement Policy and Forms 3225/7320

BRIGHAM AND WOMEN S HOSPITAL

Internet Acceptable Use Policy

Forrestville Valley School District #221

Pasadena Unified School District (PUSD) Acceptable Use Policy (AUP) for Students

Administrative Procedure 3720 Computer and Network Use

Board Adopted Policy

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

TAUNTON PUBLIC SCHOOLS Internet Acceptable Use and Social Networking Policies and Administrative Procedures

COMPUTER, INTERNET, & USE POLICY

North Clackamas School District 12

DEPARTMENT OF MENTAL HEALTH POLICY/PROCEDURE

Mentor Public Schools Board of Education 6.48 Policy Manual page 1 Chapter VI Pupil Personnel STUDENT , INTERNET AND COMPUTER USE

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools

Code of Virginia, 1950, as amended, Sections , :1, , , and

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9

INTERNET COMPUTER USAGE Access to Electronic Media. Internet safety measures shall be maintained that effectively address the following:

NORTH SHORE SCHOOL DISTRICT COMPUTER NETWORK ACCEPTABLE USE POLICY. Please read the following before signing the attached legally binding contract.

Computer, Network, and Internet Use Student Policy (As of 8/1/09)

City of Port Orchard Work Study Session Executive Summary

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

COMPUTER USE IN INSTRUCTION

Acceptable Use of ICT Policy For Staff

Instruction. Neoga Community Unit School District #3 Page 1 of 5

DIGITAL TECHNOLOGY POLICY St Example s School

NORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE

3. Electronic Mail ( )

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

POLICY NO September 8, 2015 TITLE: INTERNET AND USE POLICY

ANTRIM COUNTY COMPUTER, NETWORK SYSTEM AND INTERNET USE POLICY

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Ventura Charter School of Arts & Global Education Board Policy for Acceptable Use and Internet Safety

4600 EMPLOYEE USE OF THE DISTRICT'S COMPUTER SYSTEMS

CITY OF SALINE CELL PHONE POLICY

EMPLOYEE COMPUTER USE POLICY

Fair Employment Practices

Revised: 6-04, 8-09, 1-12 REGULATION #5420

Bates Technical College. Information Technology Acceptable Use Policy

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE

Superintendent Policy Code: 4185 Page 1 of 7 EMPLOYEE USE OF COMPUTERS, THE INTERNET AND ELECTRONIC COMMUNICATIONS

Newark City Schools Computer Network and Internet Acceptable Use Policy and Agreement

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.

Acceptable Use Policy - NBN Services

Franciscan University of Steubenville Information Security Policy

The Coca-Cola Company

Glenmeadow, Inc. Terms and Conditions of Use Legal Notices/ Privacy Policy

POLICY: INTERNET AND ELECTRONIC COMMUNICATION # 406. APPROVAL/REVISION EFFECTIVE REVIEW DATE: March 2, 2009 DATE: March 10, 1009 DATE: March 2014

Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement

POLICY TITLE: Computer and Network Service POLICY NO: 698 PAGE 1 of 6

ACCEPTABLE COMPUTER SYSTEM USE

EMPLOYEE ACCESS RELEASE AND AUTHORIZATION FORM MCS warehouse form No

Minor, for the purposes of this policy, is an individual who has not attained the age of 17.

NEBO SCHOOL DISTRICT BOARD OF EDUCATION POLICIES AND PROCEDURES

City of Grand Rapids ADMINISTRATIVE POLICY

Acceptable Use of Electronic Networked Resources & Internet Safety

Model Policy for a Law Enforcement Agency s use of Social Networking

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security

Transcription:

COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1

COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform, a voicemail and electronic mail system. These systems are provided solely to assist in the conduct of business within the company. The Company reserves the right to amend these policies. An employee s or contractor s use of the Company or Client s telephone, E-mail and communication systems constitutes the employee/contractor s agreement to abide by the Company s policies governing the Company or Client communication system as set forth below, or as modified in the future. Employee/contractor understands and acknowledges that he or she has absolutely no expectation of privacy when using the Company and/or Client s communication and/or electronic systems. Access and use of the technology platform shall be governed by the following: 1. The company and/or client owns the hardware and software associated with the technology platform and employees/contractors are not entitled to any privacy rights regarding the use and content of the information transmitted over the platform. 2. Voicemail and the data stored on it are and remain at all times the property of the company. As such, all voicemail and e-mail messages created, sent and received are and remain the property of the company and/or client. 3. The company and/or client reserves the right to retrieve and read any message composed, sent or received. Please note that even when a message is deleted, it is still possible to recreate the message; therefore, ultimate privacy of messages cannot be guaranteed to anyone. 4. Message should be limited to the conduct of business of the company. E-mail or voicemail may not be used for the conduct of personal business. Email and voice mail messages reflect the Company and Client images. They should be composed in a professional manner that is similar to messages sent on Company or Client letterhead. Employees/Contractors should keep in mind that electronic files are subject to discovery and may subsequently used in litigation involving the Company, the Client, or the employee/contractor. Therefore, it is expected that employee/contractor statements in electronic messages and files will reflect favorably on the Company, the Client, and employees/contractors. 5. While e-mail and voicemail may accommodate the use of passwords for security, the reliability of passwords for maintaining confidentiality cannot be guaranteed. You must assume that someone, other than the intended or designated recipient, may read any and all messages. The Company and/or Client reserves the right to retrieve, monitor, or review any messages in the Company or Client E-mail and Electronic Communication system, and may disclose such messages for any purpose without notice to the employee/contractor and without seeking permission of the employee/contractor. Moreover, all passwords must be made known to the company. Passwords not known Technology Platform Use Policy Page 2 of 5 53-R1

to the company may not be used. The reason for this is simple: Your system may need to be accessed by the company when you are absent. 6. Employees/contractors may access only messages, files or programs, whether computerized or not, that they have permission to enter. Unauthorized review, duplication, dissemination, removal, damage, or alteration of files, passwords, computer systems or programs, voicemail messages, or other property of the company, or improper use of information obtained by unauthorized means may be grounds for disciplinary action, up to and including termination. Employees/contractors are expected to respect the confidentiality of messages sent to others. Employees/contractors may not assess or review E-mail or voice-mail messages that are not distributed to them. 7. Employees/contractors may not use E-mail or voice mail systems to solicit for charitable or commercial ventures, or in any way that violates the Company or Client s no solicitation policy. Employees/contractors may not use the systems to proselytize for religious, political or other causes. 8. The LAN administrator will have access to all company computer and electronic equipment, including voicemail, electronic mail and Internet accounts. 9. Voicemail and e-mail messages may not contain content that may be reasonably considered offensive or disruptive to any employee/contractor. Offensive content would include, but would not be limited to, sexual comments or images, racial slurs, gender specific comments or any comments that would offend someone on the basis of his or her age, sexual orientation, religious or political beliefs, national origin, or disability. 10. Voicemail users should include in their outgoing voicemail message an instruction to leave a non-confidential message. 11. Internet, World Wide Web and Intranet access have been provided to employees/contractors for the benefit of the company and its customers, vendors and suppliers. A. Acceptable uses of the Internet: Employees/contractors accessing the Internet, World Wide Web and/or the company s own Intranet are representing the company when doing so. Accordingly, all such communications should be for professional, business reasons and should not be for personal use. Each employee/contractor is responsible for ensuring that they use their Internet access privilege in an effective, ethical and lawful manner. Chat rooms may be used to conduct official company business or to gain technical or analytical advice. Electronic mail may be used for non-confidential business contacts. B. Unacceptable uses of the Internet: Sending, saving or viewing offensive material is prohibited. Offensive material includes, but is not limited to, sexual comments, jokes or images, racial slurs, gender-specific comments or any comments, jokes or Technology Platform Use Policy Page 3 of 5 53-R1

images that would offend someone on the basis of his or her age, disability, gender, race, religion, national origin, physical attributes, sexual preference, or any other classification protected by federal, state or local law. Any use of the Internet, World Wide Web, and/or the company s Intranet to harass or discriminate is unlawful and strictly prohibited by the company. Violators will be subject to discipline, up to and including discharge. 12. Each employee/contractor is responsible for the content of all text, audio, or images that they place or send over the Internet. All messages communicated on the Internet should have the employee s/contractor s identification attached; messages may not be transmitted using someone else s name or under an assumed name. Employees/contractors who wish to express personal opinions on the Internet are encouraged to obtain their own usernames on other Internet systems. 13. To prevent computer viruses from being transmitted through the system, employees/contractors are not authorized to download any software onto their computer or any drive in that computer. Employees/contractors interested in obtaining software from the Internet should contact the LAN administrator. 14. The company and/or client s computers and the data stored on them are and remain at all times the property of the company and/or client. As such, all messages created, sent or retrieved over the Internet or the company and/or client s electronic mail system are the property of the company and/or client. Employees/contractors have no right to privacy as to any information or file transmitted or stored through the company and/or client s computer systems, voicemail, electronic mail, or other technical resources. The company and/or client reserves the right to retrieve and read any message or file. Employees/contractors should be aware that, even when a message is erased or a visit to a Web site is closed, it is still possible to recreate the message or locate the Web site. Accordingly, Internet and electronic mail messages are not private. Furthermore, all communications including text and images may be disclosed to law enforcement or other third parties without prior consent of the sender or the receiver. 15. It is the company s policy to strictly observe all domestic and international copyright laws. In determining whether those laws are applicable to a given circumstance, the company will interpret the rule in favor of the holder of the copyright. Therefore, employees/contractors are prohibited from unauthorized use or dissemination of any copyrighted material in whatever medium that material may appear. 16. Violations of any guidelines listed above may result in disciplinary action up to and including termination. In addition, the company may advise appropriate legal officials of any illegal violations. Employees/contractors who observe violations of these electronic communication policies shall notify their immediate supervisor or shall report the violation to the Human Resources Manager. 17. The Company reserves the right to modify or change the policies set forth about (or anywhere else in Handbook) to comply with applicable law, to meet changing circumstances or for any reason. Technology Platform Use Policy Page 4 of 5 53-R1

ACKNOWLEDGEMENT AND AGREEMENT REGARDING COLLINS CONSULTING, INC., TECHNOLOGY PLATFORM USE POLICY I, have received and read a copy of the Collins Consulting, Inc. Technology Platform Use Policy. I have had an opportunity to ask questions regarding this document and all questions have been answered. I agree to abide by this and any subsequent versions of the Policy. I understand that the statements contained in this document, as well as those in other personnel materials which may be issued from time to time, do not create a binding contract and may be revised at any time as deemed appropriate by Collins Consulting, Inc. I further acknowledge that I have no privacy rights, nor expectation that information transmitted by me or to me over any part of the company s technology platform will remain confidential. I am aware that use of the technology platform may be monitored. I also agree to abide by the same code of conduct while using the technology platform of any clients or customers of Collins Consulting, Inc. Consultant Date Technology Platform Use Policy Page 5 of 5 53-R1