6.11     INTERNET USAGE

К оглавлению1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 
17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 
34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 
51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 
68 69 70 71 72 73 

Internet access to global electronic information resources on the World Wide Web is provided by [COMPANY NAME] to assist employees in obtaining work-related data and technology. The following guidelines have been established to help ensure responsible and productive Internet usage. While Internet usage is intended for job-related activities, incidental and occasional brief personal use is permitted within reasonable limits.

All Internet data that is composed, transmitted, or received via our computer communications systems is considered to be part of the official records of [COMPANY NAME] and, as such, is subject to disclosure to law enforcement or other third parties. Consequently, employees should always ensure that the business information contained in Internet e-mail messages and other transmissions is accurate, appropriate, ethical, and lawful.

The equipment, services, and technology provided to access the Internet remain at all times the property of [COMPANY NAME]. As such, [COMPANY NAME] reserves the right to monitor Internet traffic, and retrieve and read any data composed, sent, or received through our online connections and stored in our computer systems.

Data that is composed, transmitted, accessed, or received via the Internet must not contain content that could be considered discriminatory, offensive, obscene, threatening, harassing, intimidating, or disruptive to any employee or other person. Examples of unacceptable content may include, but are not limited to, sexual comments or images, racial slurs, gender-specific comments, or any other comments or images that could reasonably offend someone on the basis of race, age, sex, religious or political beliefs, national origin, disability, sexual orientation, or any other characteristic protected by law.

The unauthorized use, installation, copying, or distribution of copyrighted, trademarked, or patented material on the Internet is expressly prohibited. As a rule, if an employee did not create the material, does not own the rights to it, or has not gotten authorization for its use, it should not be put on the Internet. Employees are also responsible for ensuring that the person sending any material over the Internet has the appropriate distribution rights.

Internet users should take the necessary anti-virus precautions before downloading or copying any file from the Internet. All downloaded files are to be checked for viruses; all compressed files are to be checked before and after decompression.

Abuse of the Internet access provided by [COMPANY NAME] in violation of law or [COMPANY NAME] policies will result in disciplinary action, up to and including termination of employment. Employees may also be held personally liable for any violations of this policy. The following behaviors are examples of previously stated or additional actions and activities that are prohibited and can result in disciplinary action:

Sending or posting discriminatory, harassing, or threatening messages or images

Using the organization's time and resources for personal gain

Stealing, using, or disclosing someone else's code or password without authorization

Copying, pirating, or downloading software and electronic files without permission

Sending or posting confidential material, trade secrets, or proprietary information outside of the organization

Violating copyright law

Failing to observe licensing agreements

Engaging in unauthorized transactions that may incur a cost to the organization or initiate unwanted Internet services and transmissions

Sending or posting messages or material that could damage the organization's image or reputation

Participating in the viewing or exchange of pornography or obscene materials

Sending or posting messages that defame or slander other individuals

Attempting to break into the computer system of another organization or person

Refusing to cooperate with a security investigation

Sending or posting chain letters, solicitations, or advertisements not related to business purposes or activities

Using the Internet for political causes or activities, religious activities, or any sort of gambling

Jeopardizing the security of the organization's electronic communications systems

Sending or posting messages that disparage another organization's products or services

Passing off personal views as representing those of the organization

Sending anonymous e-mail messages

Engaging in any other illegal activities

Internet access to global electronic information resources on the World Wide Web is provided by [COMPANY NAME] to assist employees in obtaining work-related data and technology. The following guidelines have been established to help ensure responsible and productive Internet usage. While Internet usage is intended for job-related activities, incidental and occasional brief personal use is permitted within reasonable limits.

All Internet data that is composed, transmitted, or received via our computer communications systems is considered to be part of the official records of [COMPANY NAME] and, as such, is subject to disclosure to law enforcement or other third parties. Consequently, employees should always ensure that the business information contained in Internet e-mail messages and other transmissions is accurate, appropriate, ethical, and lawful.

The equipment, services, and technology provided to access the Internet remain at all times the property of [COMPANY NAME]. As such, [COMPANY NAME] reserves the right to monitor Internet traffic, and retrieve and read any data composed, sent, or received through our online connections and stored in our computer systems.

Data that is composed, transmitted, accessed, or received via the Internet must not contain content that could be considered discriminatory, offensive, obscene, threatening, harassing, intimidating, or disruptive to any employee or other person. Examples of unacceptable content may include, but are not limited to, sexual comments or images, racial slurs, gender-specific comments, or any other comments or images that could reasonably offend someone on the basis of race, age, sex, religious or political beliefs, national origin, disability, sexual orientation, or any other characteristic protected by law.

The unauthorized use, installation, copying, or distribution of copyrighted, trademarked, or patented material on the Internet is expressly prohibited. As a rule, if an employee did not create the material, does not own the rights to it, or has not gotten authorization for its use, it should not be put on the Internet. Employees are also responsible for ensuring that the person sending any material over the Internet has the appropriate distribution rights.

Internet users should take the necessary anti-virus precautions before downloading or copying any file from the Internet. All downloaded files are to be checked for viruses; all compressed files are to be checked before and after decompression.

Abuse of the Internet access provided by [COMPANY NAME] in violation of law or [COMPANY NAME] policies will result in disciplinary action, up to and including termination of employment. Employees may also be held personally liable for any violations of this policy. The following behaviors are examples of previously stated or additional actions and activities that are prohibited and can result in disciplinary action:

Sending or posting discriminatory, harassing, or threatening messages or images

Using the organization's time and resources for personal gain

Stealing, using, or disclosing someone else's code or password without authorization

Copying, pirating, or downloading software and electronic files without permission

Sending or posting confidential material, trade secrets, or proprietary information outside of the organization

Violating copyright law

Failing to observe licensing agreements

Engaging in unauthorized transactions that may incur a cost to the organization or initiate unwanted Internet services and transmissions

Sending or posting messages or material that could damage the organization's image or reputation

Participating in the viewing or exchange of pornography or obscene materials

Sending or posting messages that defame or slander other individuals

Attempting to break into the computer system of another organization or person

Refusing to cooperate with a security investigation

Sending or posting chain letters, solicitations, or advertisements not related to business purposes or activities

Using the Internet for political causes or activities, religious activities, or any sort of gambling

Jeopardizing the security of the organization's electronic communications systems

Sending or posting messages that disparage another organization's products or services

Passing off personal views as representing those of the organization

Sending anonymous e-mail messages

Engaging in any other illegal activities