INTRODUCTION
We provide employees with access to various computing, telephone and postage facilities (“the Facilities”) to allow them to undertake the responsibilities of their position and to improve internal and external communication.
1. SCOPE AND APPLICABILITY
This Policy applies to all individuals that use or operate within our IT Systems, including networks, Laptops, desktops, telephones or any other facility that is provided for communication purposes.
This Policy applies to the use of:
Observation of this Policy is mandatory and forms part of the Terms and Conditions of Employment. Misuse of the Facilities will be treated as gross misconduct and may lead to dismissal.
2. PURPOSE
This Policy sets out the Company’s policy on the use of the Facilities and it includes:
This Policy has been created to:
3. COMPUTER FACILITIES - USE OF COMPUTER SYSTEMS
To comply with this policy, it should be noted that unless written prior authorisation has been received by departmental managers, the Facilities must be used for business purposes only.
In order to maintain the confidentiality of information held on or transferred via the Company’s Facilities, security measures are in place and must be followed at all times. A log-on ID and password is required for access to the Company’s network. Despite the use of a password, the Company reserves the right to override passwords and obtain access to any part of the Facilities.
Individuals are ultimately responsible for keeping passwords secure. They must not give it to anyone, including colleagues, except as expressly authorised by the Company. Passwords should be changed frequently
Individuals are expressly prohibited from using the Facilities for the sending, receiving, printing or otherwise disseminating information which is the confidential information of the Company or its clients other than in the normal and proper course of carrying out duties for the Company.
4. IT SECURITY PROCEDURES
In order to ensure proper use of computers, all individuals must adhere to the following practices:
5. SOFTWARE
Software piracy could expose both the Company and the user to allegations of intellectual property infringement. The Company is committed to following the terms of all software licenses to which the Company is a contracting party. This means, in particular, that:
6. LAPTOP COMPUTERS / iPads
At various times during employment with the Company, individuals may use a laptop. These computers, along with related equipment and software are subject to all of the Company’s policies and guidelines governing non-portable computers and software (see two paragraphs in software section above). However, the use of a laptop creates additional problems, especially in respect of potential breaches of confidentiality. When using a laptop:
7. E-MAIL (INTERNAL OR EXTERNAL USE)
Internet e-mail is not a secure medium of communication – it can be intercepted and read. Do not use it to say anything that the Company or individuals would not wish to be made public. If individuals are sending confidential information by e-mail this should be sent using password-protected attachments.
E-mail should be treated as any other documentation. If an individual would normally retain a certain document in hard copy you should retain the e-mail.
Do not forward e-mail messages unless the original sender is aware that the message may be forwarded. If you would not have forwarded a copy of a paper memo with the same information do not forward the e-mail.
E-mail inboxes should be checked on a regular basis.
As with many other records, e-mail may be subject to discovery in litigation. Like all communications, individuals should not say anything that might appear inappropriate or that might be misinterpreted by a reader or bring the Company into disrepute.
Individuals should not use the Company email system for private messages during the course of work activities unless absolutely necessary and in these circumstances, the following message should be contained within the email that is sent:
“This e-mail does not reflect the views or opinions of our organisation”
Use of e-mail facilities for personal use is permitted during lunch breaks providing that:
In the event that individuals are away from the office and use e-mail as an external means of communication, they must ensure that the autoreply service is used to inform the sender that they are unavailable. Failure to do so could lead to disciplinary action. If there is any doubt as to how to use these facilities please contact the Group IT Support Department.
Viewing, displaying, storing (including data held in RAM or cache) or disseminating materials (including text and images) that could be considered to be obscene, racist, sexist, or otherwise offensive may constitute harassment and such use of the Facilities is strictly prohibited.
NB: The legal focus in a harassment case is the impact of the allegedly harassing material on the person viewing it, not how the material is viewed by the person sending or displaying it.
8. Internet
Use of the Internet, or Internet services, by unauthorised users, is strictly prohibited. Individuals are responsible for ensuring that they are the only person using the authorised Internet account and services.
Downloading any files from the Internet using the computer facilities is not permitted. If there is a file or document on the Internet that is required, the individual should contact the Group IT Support Department to make arrangements for it to be evaluated and checked for viruses. It will be at the discretion of the Group IT Support Department on whether to allow such download.
Viewing, downloading, storing (including data held in RAM or cache) displaying or disseminating materials (including text and images) that could be considered to be obscene, racist, sexist, or otherwise offensive may constitute harassment and such use is strictly prohibited.
NB: The legal focus in a harassment case is the impact of the allegedly harassing material on the person viewing it, not how the material is viewed by the person sending or displaying it.
Posting information on the Internet, whether on a newsgroup, via a chat room, or via e-mail is no different from publishing information in the newspaper. If a posting is alleged to be defamatory, libelous, or harassing, the employee making the posting and the Company could face legal claims for monetary damages.
Using the Internet for the purpose of trading or carrying out any business activity other than Company business is strictly prohibited.
Subject to the above you are allowed to use the Internet for personal use during your lunch break. Use of the Internet for personal use at any other time is strictly prohibited.
For the avoidance of doubt, the matters set out above include the use of 3G/4G Data.
9. MONITORING POLICY
The Policy of the Company is that we monitor use of the Facilities.
The Company recognises the importance of an individual’s privacy but needs to balance this against the requirement to protect others and preserve the integrity and functionality of the Facilities.
The Company may from time to time monitor the Facilities. Principle reasons for this are to:
The Company may adopt at any time a number of methods to monitor the use of the Facilities. These may include:
If at any time an employee wishes to use the Facilities for private purposes without the possibility of such use being monitored they should contact their Department Head or the nominated deputy. This person will consider such request and any restrictions upon which such consent is to be given. In the event that such request is granted the Company (unless required by law) will not monitor the applicable private use.
The Company will not (unless required by law or in receiving legal or professional advice):
The Company may be prohibited by law from notifying employees using the Facilities of a disclosure to third parties.
10. BUILDING SECURITY
Confidential and sensitive data is secured in the building. This is both in paper form (such as files of paperwork) and electronically (such as computers, storage devices and servers).
To improve the security and confidentiality of information, we require the following:
11. CLEAR DESK
To improve the security and confidentiality of information, we have adopted a Clean Desk Policy for computer and printer workstations.
This ensures that all sensitive and confidential information, whether it be on paper, a storage device, or a hardware device, is properly locked away or disposed of when a workstation is not in use. This policy will reduce the risk of unauthorised access, loss of, and damage to information during and outside of normal business hours or when workstations are left unattended.
Whenever a desk is unoccupied for an extended period of time the following will apply:
1. Any print jobs containing sensitive and confidential paperwork should be retrieved immediately. When possible, the “Locked Print” functionality should be used.
2. All paperwork left over at the end of the workday will be properly disposed of.
12. GENERAL GUIDANCE
Never leave any equipment or data (including client files, laptops, computer equipment, mobile phones, and PDAs) unattended on public transport or in an unattended vehicle.
Data Control Officers - Karl Brannon and Louise Morley