Sample Computer and Email Usage Policy
In today's technology world, almost every company uses computers. Here is a sample Computer and Email Usage Policy.
To help you do your job, THE COMPANY may give you access to computers, computer files, the email system, and software. You should not use a password, access a file, or retrieve any stored communication without authorization. To make sure all employees follow this policy, THE COMPANY may monitor computer and email usage.
We try hard to have a workplace which is free of harassment and sensitive to the diversity of our employees. Therefore, we do not allow employees to use computers and email in ways which are disruptive, offensive to others, or harmful to morale.
At THE COMPANY you may not display, download, or email sexually explicit images, messages, and cartoons. You also may not use computers and email for ethnic slurs, racial comments, off-color jokes, or anything which another person might take as harassment or disrespect.
You may not use email to ask other people to contribute to or to tell them about businesses outside of THE COMPANY religious or political causes, outside organizations, or any other non-business matters.
THE COMPANY buys and licenses computer software for business purposes. We do not own the copyright to this software or its documentation. Unless the software developer authorizes us, we do not have the right to use the software on more than one computer.
You may only use software on local area networks or on multiple machines according to the software license agreement. THE COMPANY prohibits the illegal duplication of software and its documentation.
If you become aware of any violations to this policy, notify your supervisor, the Human Resources Department or any member of management. Employees who violate this policy are subject to disciplinary action, up to and including termination of employment.
For over 30 years, Scott Greene has been helping companies meet the challenges of the swiftly evolving computer technology industry.
Directly from high school, Scott went to work for IBM. Scott studied Systems Engineering at the University of Arizona. He has since earned certifications in many products and programming languages.
The Evidence Solutions team analyzes data from Computers, Cell Phones, Black Boxes, Dispatch Systems, Medical Records, Email systems and more. Scott then explains the digital evidence in plain English.
Scott’s extensive knowledge draws clients to him from all over the United States as well as Internationally for consulting, Forensics and expert witness services. His extensive and diverse experience allows him to be an expert in many facets of digital and electronic evidence. Scott, a sought after speaker and educator, travels throughout the country sharing his knowledge and presenting to local, regional, national and International organizations.
Copyright Evidence Solutions, Inc.
Disclaimer: While every effort has been made to ensure the accuracy of this publication, it is not intended to provide legal advice as individual situations will differ and should be discussed with an expert and/or lawyer.For specific technical or legal advice on the information provided and related topics, please contact the author.