Employees are expected to use company technology and communication channels, including computers, email, internet access, and telephones, for business purposes only. Any personal use of these resources should be kept to a minimum and should not interfere with work responsibilities.
Employees are responsible for creating and maintaining strong passwords for all company systems and applications. Passwords should not be shared with others, and employees should log out of systems when they are finished using them. Employees should also report any suspected security breaches or suspicious activity to their supervisor or the IT department.
Employees must protect the privacy of company and customer data by not sharing confidential information with unauthorized individuals or using the information for personal gain. All data should be stored and transmitted securely, and employees should follow company policies for data retention and disposal.
Employees should use only authorized software and hardware on company systems and should not install or download unauthorized software or hardware. Any software or hardware issues should be reported to the IT department immediately.
Employees are expected to use the internet for business purposes only and should not access inappropriate websites or engage in any activity that could be considered offensive or harmful to the company's reputation. Employees should also be aware of potential security risks associated with internet use, such as phishing scams or malware.
Email UseEmployees should use email for business purposes only and should not send or receive personal emails on company systems. Employees should also be aware of potential security risks associated with email use, such as phishing scams or virus attachments.
Employees should use social media in a professional and respectful manner and should not engage in any activity that could be considered offensive or harmful to the company's reputation. Employees should also be aware of potential security risks associated with social media use, such as phishing scams or malware.
Employees who use company-issued or personal mobile devices for work purposes should follow company policies for data privacy, software and hardware use, and security. Employees should also report any lost or stolen devices to the IT department immediately.
Employees should use company-approved communication channels for business purposes, including telephone, email, instant messaging, and video conferencing. Employees should also be respectful and professional when communicating with colleagues, clients, or customers.
Employees who violate the IT and Communication Policy may be subject to disciplinary action, up to and including termination of employment. The company reserves the right to monitor employee use of company technology and communication channels to ensure compliance with this policy.
The IT and Communication Policy should be reviewed and updated regularly to ensure that it remains relevant and effective. It should also be communicated to all employees and made available to new employees upon hire.
Get started by yourself, for
A 14-days free trial to source & engage with your first candidate today.
Book a free TrialAchieving Awesomeness Recognized with an
Let's delve into the possibilities of what
we can achieve for your business.