Free Essay

Communication Policy

In: Business and Management

Submitted By elizabethdriver
Words 395
Pages 2
Electronic Communication Policy and Procedures
Policy Statement
The role of the electronic communication policy is to provide clear expectations and mitigate risk. It is important that electronic communication support employees’ business efforts; however, it is imperative that the company ensures employees do not engage in misuse or abuse of the system.
Employees are solely responsible for the information sent, received, and stored on the organizations system; however, the company retains the right to all information. Furthermore, the company has the right to limit, restrict, deny, and view all electronic communication. To maintain privacy and the integrity of the system, the company expects employees to utilize passwords to enter the system and encrypt all communication that has personally identifiable information. To save energy, the company requires employees to turn off computers at the end of each workday. Moreover, the company maintains the right to monitor and audit all systems and electronic communication without prior notification.
Scope
The electronic communication policy and procedures apply to all company employees.
Procedures
The company expects employees to abide by the following procedures regarding electronic communication: 1. Maintain the security of passwords to enter the organization’s system. The company strictly prohibits employees from attempting to use another individual’s password or account. 2. Limit personal use to breaks and outside the scheduled work period. Personal use is acceptable as along as it does not interfere with the employee’s productivity or interrupt or slow down the network. 3. Understand and acknowledge that their activity may be monitored. 4. Report abuse or illegal activity. 5. Scan all e-mails and attachments for viruses, worms, Trojan horses, or trap doors. If a scan indicates a potential threat, the employee must report the threat to the Information Technology Department immediately. 6. Avoid sending emails larger than 10MB to avert interrupting or slowing the network. 7. Encrypt and digitally sign all emails containing personally identifiable information.
The company strictly prohibits the following activities: 1. Sending chain mail, spam, solicitations, advertisements, or commercial emails not intended for the company’s benefit. 2. Conducting illegal activities or gambling. 3. Sending electronic communication that intends to harass, intimidate, threaten, embarrass, humiliate, or degrade another individual. 4. Sending electronic communication that contains obscenities, pornography, racist, sexist, or disparaging material regarding race, origin, sex, sexual orientation, age, disability, religion, or political beliefs. 5. Downloading or installing software. 6. Accessing social media sites.…...

Similar Documents

Premium Essay

Policy

...Acceptable email use policy - sample template Use of email by employees of [business name] is permitted and encouraged where such use supports the goals and objectives of the business. However, [business name] has a policy for the use of email whereby the employee must ensure that they: • comply with current legislation • use email in an acceptable way • do not create unnecessary business risk to the company by their misuse of the internet Unacceptable behaviour The following behaviour by an employee is considered unacceptable: • use of company communications systems to set up personal businesses or send chain letters • forwarding of company confidential messages to external locations • distributing, disseminating or storing images, text or materials that might be considered indecent, pornographic, obscene or illegal • distributing, disseminating or storing images, text or materials that might be considered discriminatory, offensive or abusive, in that the context is a personal attack, sexist or racist, or might be considered as harassment • accessing copyrighted information in a way that violates the copyright • breaking into the company’s or another organisation’s system or unauthorised use of a password/mailbox • broadcasting unsolicited personal views on social, political, religious or other non-business related matters • transmitting unsolicited commercial or advertising material • undertaking deliberate activities that waste staff effort or networked......

Words: 466 - Pages: 2

Premium Essay

Policy

...asked God “Am I my brother’s keeper?” God expects us to look after one another and have each other’s best interest at heart. If we see a fellow citizen without food, we are supposed to provide them with a meal. If we see one in need of anything, we are supposed to help them as much as we can. There are economic institutions such homeless shelters that allow people who have nowhere to go for adequate shelter to stay free of charge. The rooms are available temporarily and sometimes upon first come first serve basis. Some shelters are designed to serve children and mothers and others for men and children, they are usually gender specific. A meal usually dinner is provided for those who take advantage of these homeless shelters. For communication of their availability, most coordinate with the federally mandated 2-1-1 or the 3-1-1 phone information system which allow needy persons to find out where shelters are located (MacGillivray, et. al, 2005) Conclusion I am personally all about helping the poor in any way that I can; but I am on the fence about poverty. I take time to understand both sides of the issue; from a wealthy and impoverished person’s perspective. For instance, if a homeless person comes up to me asking for money; I will give them whatever I am able to give at that time. I know many people who feel they should not give to the homeless because in their opinion those people do not use the money constructively. I feel that is not for me to decide, when I......

Words: 2903 - Pages: 12

Premium Essay

Policy

...Looking at the major changes in families over the past fifty years how has these societal changes in transportation, technology and social policies affected family life? The advancement and evolution of technology has dramatically changed society and families as a whole in a diversity of ways. Transportation has enabled people to travel further to visit family in different states or countries in a timelier manner. For example, depending on environment a person can fly oversees to visit family within hours at a reasonable cost allowing for family to stay connected in a more personal way. Additionally, the way we communicate in this new era of the internet has had a positive as well as a negative impact in how we socialize, whether it is globally, locally or within family circles. Although texting and e-mail have made it convenient to communicate, it has also dissocialized us to the degree of personal interaction. For instance, observance of individuals who are together in social settings may interact less because they have become reliant upon social networking to intermingle. Still, the internet has become a positive educational, vocational and communication tool like no other method over the past fifty years. “Sociologist and political groups all have different views of social policies, some believe that they are a good way of achieving something and others see them as bad because they may only support one view point and not others”. Reference: Arjunan,N.K.(2010).......

Words: 253 - Pages: 2

Premium Essay

Policy

...Information Security Policy Best Practice Document Produced by UNINETT led working group on security (No UFS126) Authors: Kenneth Høstland, Per Arne Enstad, Øyvind Eilertsen, Gunnar Bøe October 2010 © Original version UNINETT 2010. Document No: Version / date: Original language : Original title: Original version / date: Contact: © English translation TERENA 2010. All rights reserved. GN3-NA3-T4-UFS126 October 2010 Norwegian “UFS126: Informasjonsikkerhetspolicy” July 2010 campus@uninett.no UNINETT bears responsibility for the content of this document. The work has been carried out by a UNINETT led working group on security as part of a joint-venture project within the HE sector in Norway. Parts of the report may be freely copied, unaltered, provided that the original source is acknowledged and copyright preserved. The translation of this report has received funding from the European Community's Seventh Framework Programme (FP7/2007-2013) under grant agreement n° 238875, rel ating to the project 'Multi-Gigabit European Research and Education Network and Associated Services (GN3)'. 2 Table of Contents EXECUTIVE SUMMARY INTRODUCTION 1 1.1 1.2 4 5 6 6 6 INFORMATION SECURITY POLICY Security goals Security strategy 2 3 3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 3.10 3.11 3.12 ROLES AND AREAS OF RESPONSIBILITY PRINCIPLES FOR INFORMATION SECURITY AT Risk management Information security policy Security organization Classification and......

Words: 6043 - Pages: 25

Premium Essay

Policy

...Policy Issues and the Police AJS/582 February 14, 2012 Abstract Community policing is a new idea that has been introduced to law enforcement. The program is federally funded and was created with the intentions of providing citizens the opportunity to work collectively along side with the police to diminish fear and crimes within communities. By examining police departments within the Unites States which has implemented community policing programs, a determination of whether there has been a positive or negative change can be concluded. Community policing, when implemented and organized properly is the ideal situation for police departments and the communities to build an alliance against crime. Community Policing Foot patrol or walking the beat are the many terms used to represent community policing. This community relationship has been a subject of discussion and research since the early 1900’s and still is today (Trojanowicz ,1986). Community policing was established with the idea of local law enforcement and the community working collectively, focusing on reducing and eventually preventing crime and social disorder. The strategy is to achieve a more valuable and proficient crime control, reduce terror of crime and improve quality of life. Community policing also helps the police gain the trust and cooperation of the community by having a strong presence in the area.  Most......

Words: 1462 - Pages: 6

Free Essay

Policy

...Policy Brief Families are often faced with a range of different, complex health and psychosocial problems. Place-based approaches aim to address these complex problems by focusing on the social and physical environment of a community and on better integrated and more accessible service systems, rather than focusing principally on the problems faced by individuals. A place-based approach targets an entire community and aims to address issues that exist at the neighbourhood level, such as poor housing, social isolation, poor or fragmented service provision that leads to gaps or duplication of effort, and limited economic opportunities. By using a community engagement approach to address complex problems, a place-based approach seeks to make families and communities more engaged, connected and resilient. An initiative of The Royal Children’s Hospital, Melbourne Centre for Community Child Health Issue 23 > 2011 Translating early childhood research evidence to inform policy and practice Place-based approaches to supporting children and families Additionally, the circumstances in which children are growing up have changed10. Children now have fewer models of caregiving, community environments are less child-friendly and electronic media has become a dominant feature in children’s lives12,13,14. Social climate change is also evident in the increasing complexity of modern society15. One manifestation of this complexity is the increase in ‘wicked’ problems16 such as......

Words: 4318 - Pages: 18

Premium Essay

Electronic Communications Policy

...Electronic Communications Policy Introduction: In today’s fast paced and ever-changing economic environment, electronic communication tools are heavily relied on and recognized as an enormous company asset. Electronic communications equipment and services include internal and external electronic mail (e-mail), facsimiles, telephone systems, voice mail, internet access, cellular phones, as well as computer networks, files, hardware and software. While we encourage the use of these company resources, it is important to note they should only be used for their intended purposes and in a manner in which their integrity and performance is protected. “Company” will continually monitor the use of all company assets. Purpose: The guiding purpose of “Company’s” electronic communications policy is to set forth the expected standards of conduct, rules, restrictions, procedures, and disciplinary actions surrounding their use. Abuse and misuse of electronic communication tools potentially puts both the company and employees at risk. In an effort to minimize risks, “Company” is responsible for securing its electronic communications system against unauthorized access, prohibited uses, abuse, and violation of local, state, federal, and international laws. In addition, we will ensure any applicable electronic communications will be retained in accordance with any applicable laws. Employee acknowledgement and consent is required. Scope: The electronic communications policy applies......

Words: 806 - Pages: 4

Premium Essay

Policies

...Academic Policies & Procedures Weekly Schedule Online: The electronic class week begins on Tuesday (Day 1) and ends on Monday (Day 7). For example, when an assignment is due on Day 5, it must be posted no later than 11:59 p.m. Mountain Standard Time year-round (M.S.T.) on Saturday of that week. (All classroom messages are automatically date and time stamped using M.S.T.) Associate Programs: The electronic class week begins on Monday (Day 1) and ends on Sunday (Day 7). For example, when an assignment is due on Day 5, it must be posted no later than 11:59 p.m. M.S.T. on Friday of that week. (All classroom messages are automatically date and time stamped using M.S.T.) Local Campus: The course begins on the date scheduled for the local campus class meeting. All reading assignments for the class are available on eCampus prior to the scheduled date. If there is an assignment due at the first local campus class meeting, information about the assignment is also available on eCampus. Directed Study: The course begins on the date scheduled by the campus. The scheduled date is considered Day 1. Assignments are due by 11:59 p.m. Mountain Standard Time year-round (M.S.T.) on the day they are due. See the faculty member’s syllabus for assignment deadlines. FlexNet®: The course begins on the date scheduled for the local campus class meeting. All reading assignments for the class are available on eCampus prior to the scheduled date. If there is an assignment due at the first local campus......

Words: 3538 - Pages: 15

Free Essay

Policies

...Organizational policies are used to achieve uniformity, economics, public relations, benefits and other objectives that many be unrelated to recruiting. At time, policies can be a source of constraints. Policies that may affect recruitment are highlighted below. Compensation policies: pay policies are a common constraints faced by recruiters, Organizations with HR departments usually establish pay ranges for different jobs to ensure equitable wages and salaries. Recruiters seldom have the authority to exceed the stated pay ranges. Of course, pay ranges must be special cases such as international openings. Applying domestic compensation rates overseas often entails overpaying or underpaying foreign nationals compared with what they would normally earn. At the same time, employees which are reassigned overseas often need and expect an increase to handle extra living expenses. Employment status policies: some companies have policies on hiring part-time and temporary employees. Although there is growing interest in hiring these types of workers,policies can cause recruiters to reject all but those seeking full-time work. Limitations on part-time and temporary employees reduce the pool of potential applicants, especially since this segment of the workforce is a fast-growing one. In fact, a study of 484 firms found a one-third in cease in the use of part-timers. policies that discriminate against any refundable group should be reviewed, when those groups are protected under......

Words: 451 - Pages: 2

Free Essay

Policies

...Classroom Policies - Student Expectations and Faculty Commitment Attendance Grand Canyon University requires online students to attend courses every week, marked by activity in the online classroom. An online week for undergraduate students is Monday through Sunday and for graduate students is Thursday through Wednesday. Students are not permitted to be out of attendance more than two consecutive, online weeks. An administrative withdrawal will be processed should a student be out of attendance for more than two consecutive, online weeks. ________________________________________ Discussion Questions and Participation: Participating in classroom discussion is paramount to the learning experience. Participating in the weekly discussions allows students and instructors to share experiences, investigate complicated subject matter, share expertise, and examine the content from new perspectives. Most classes have 2 discussion questions due each week. Students must post their initial response to the 1st discussion question by Day 3, and the 2nd discussion question by Day 5 of each week. In the event the course week has more or less than 2 discussion questions due, please follow the due dates provided by the instructor. The initial response to the discussion question earns a distinct grade and subsequent participation in the discussion earns a distinct grade. Participation can only be earned by posting substantive, quality messages to fellow classmates and the instructor in the...

Words: 790 - Pages: 4

Free Essay

Policies

...effective purchasing power plus relevant export markets • Central banking system and monetary policy – controls of the commercial banks, the ability and willingness to control the money supply, the effectiveness of government policies regarding price stability, commercial bank reserves, discounting, credit controls and similar factors • Fiscal policy – general policies concerning government expenditures, their timing and their impact • Economic stability – the vulnerability of the economy to economic fluctuations of depression and boom, price stability and overall economic growth stability • Organization of capital markets – their existence, integrity, effectiveness and total impact • Factor endowment – relative supply of capital and land; size and general health of the work force • Social ahead capital – availability and quality of power supplies, water, communication systems, transportation, public warehousing, etc. • Competition – number of competitors and degree of competition Administrative and political factors • Relevant legal rules of the game – quality, efficiency, and effectiveness of legal structure relevant to business • Defense policy – impact of defense policy on industrial enterprise in terms of trading and purchasing policies • Foreign policy – impact of policy on industrial enterprise in terms of trading restrictions • Political organization......

Words: 823 - Pages: 4

Premium Essay

Policies

...POLICIES FOR SUPPLIERS NEW MEGAPUI Policy I. Supplier Accreditation 1. MEGAPUI shall continuously search a BUYERS for the items with the intention of establishing strategic and long-term business relationships. 2. The selection of suppliers is the responsibility of Procurement personnel. In making the selection Procurement will coordinate closely with the requisitioning department/subsidiaries to obtain adequate and reasonable specifications. Procurement should endeavor to place orders with regard to the dependability and service record of the supplier. The nature of the guaranty and warranty and its price and the quality. Preference should be given to the following types of suppliers, providing this involves no sacrifice in quality, service or price. 3.Supplier with adequate financial strength who also have a reputation for adhering to specifications and delivery schedules. 4.There will be two types of accreditation. specific to suppliers class: *Non-primary – supplier may either be New (with minimal transaction and no established performance history) or Accredited (with frequent transactions but on a short-term basis). Accreditation will focus on establishing legality of business and supplier’s capability to supply/deliver. *Primary – Supplier who has demonstrated an excellent performance history and transactions are on a long-term basis. Evaluation will focus on establishing supplier’s capability to sustain excellent performance and support long-term relationship with...

Words: 578 - Pages: 3

Free Essay

Policies

... Theories of Crime Causation October 31, 2011 Abstract In this paper you will read about three policies that I chose and The Diversion Program. You will also read about the Prison rehabilitation program as well as confinement. The three policies that I chose to write about is: Diversion Programs (drug, court, etc.), the second policy that I picked is Prison Rehabilitation Programs and the last is the Death Penalty. The Diversion Program is a good thing. It was established in 1996 by Bynum and Thompson. This is very interesting because if you look at it one way it helps the court out by them taking care of the not so bad kids, without court but maybe the kids need a good scare, by putting them thru the courts. Regardless the Division Program is a good thing. In 1967 presidents’ commission on law enforcement and the administration of justice had alternative programs developed for juvenile offenders within local communities. The theories that would fit into this policy would be social disorganization theory, windows theory, and Differential association theory. On any given day, as far as arrest go minority youth outweigh Caucasian kids. (Krisberg & Austin, 1993). In 1985 52% of juveniles were incarcerated, 1989 was 60% and 1995 it was 65%, this......

Words: 814 - Pages: 4

Premium Essay

Policy

...Richman Investment Policy Number 1338 Appropriate Use Policy Sections 1. Purpose 2. Scope 3. Policy 3.1 Bluetooth Guideline 4. Reason for Policy 5. Enforcement and Discipline 6. Definitions 1. Purpose The purpose of the policy is to guarantee work end ethical normality, and company network secure and stable. To ensure the protection of Richman Investment Employees, partners, and the company from illegal, malicious or damaging actions executed by either known or unknown individuals or virtual entity. This policy applies to the safety of all equipment, machine, and smart device to be protected from risks of viral attacks or network compromise. 2. Scope This Acceptable Policy is not intended to restrict national rights or liberties but to protect Richman Investment integrity and foundation for a true, honest, and safe workplace. The promotion of work safe and non-disruptive content will increase production and decrease unproductive work hours for all personnel including third parties. 3. Policy 1. Security at Richman Investment requested a policy regarding the safety through Internet and e-mail access by disabling or uninstalling unnecessary add-ons and applications unrelated to work that is installed in browsers, computer and smart devices . Installing undesired, or banned programs that are unrelated to carrying out work activities will not be tolerated. Outside media like an USB......

Words: 545 - Pages: 3

Premium Essay

Policy

...THE CASE OF THE PRICING PREDICAMENT Cost-cutting customers. Hungry Foreign rivals. Should Standard Machine Lowerits bid? By MARY KARR As soon a Scott Palmer’s secretary told him that Joanne Braker form Occidental Aerospace was on the phone, he knew he was in for a long day. Inheriting the Occidental account had helped him earn top sales commissions last year, his first at Standard Machine Corporation. But a month ago, Joanne informed Scott of the purchasing department’s new, more aggressive competitive bid policy, and said it would apply to the acquisition of a computerized milling machine for Occidental’s new training center. Scott nevertheless submitted his $429,000 proposal with great confidence and even boasted to his regional sales manager that the deal was “in the bag”. After two weeks of unreturned phone calls, however, Scott got the feeling his confidence had been sorely misplaced. “Hi, Joanne, Long time, no hear. What’s up?” Joanne got right to the point. “Scott, I’ve got a $22,000 problem you can solve”. “What do you mean?” “You know we have to look hard at a number of different vendors on purchases of this size. And your bid is well above the competition’s. Kakuchi came in under $390,000, and Akita Limited at a little over 400K”. She waited, and Scott waited back, not wanting to show his anxiousness. “The way I count it,” she finally continued, “You’re $22,000 too high, and I just can’t sell that here”. “Well, Joanne,......

Words: 1707 - Pages: 7

Amateur (252) | Neujahrswahnsinn in Berlin: Raketen als Geschosse - Einsatzkräfte beklagen Dutzende Übergriffe | Peter Franzén