Free Essay

New E-Mail Policy

In:

Submitted By John67
Words 836
Pages 4
New e-mail policy

Below are the guide lines we will use to communicate through our company e-mail system. These rules will increase productivity and reduce time sorting through e-mail that does not affect your area of the company.
• Be brief and Professional; stick to the facts of what your trying to communicate, keep the bottom line up front and be respectful we are all on the same team.
• Courtesy Copy and Reply all too only those needed; ensure you only send your e-mail to people with whom the message is intended for. Reply all can cause problems with personnel getting the wrong information.
• Attachment size will be limited; Large attachment clog up e-mail inbox and slow down the performance of the net work.
• All attachments will be screened by antivirus before opened; software viruses are a great risk to our company network and no one wants to be the one to crash our communication system.
• No forwarding of chain e-mail; chain e-mail can be counterproductive and offensive your fellow employees.
• Spell out all words before using Acronyms; Not everyone is familiar with all acronyms so the first time you use an acronym spell the words out then put the acronym next to it in parentheses.
• No writing in all CAPs; No shouting within your e-mail. This refers back to being professional and courteous to your fellow employees.
• Use spell check; This will not always work to correct all misspelled words and bad grammar, but will cut down on the majority of problems we will have.
• Do not share the company address book; other e-mail address kept in the company are for official use only and are not to be shared or used outside the company work space. Sharing a coworker’s e-mail address for solicitation is a violation of their privacy.
• Do not share company information without side sources; Do not send e-mails containing secure work related information to your personal e-mail address outside of the company network. This could compromise future business and relationships with other companies.
• No nasty grams; E-mail is not an appropriate for mat to argue with a fellow employee, nor is it a professional way to communicate improvements that need to be made in an employee work performance. All disagreements need to be settled through meetings and anything dealing with an employees work performance both negative and positive need to be done face to face in a professional setting.
These rules can be added to or take from in the future, we just have to have supporting information on why to add a new rule or take away one that I have put in place.

Very Respectfully

Summary
I choose these basic rules as a start point with the policy. I did not feel the entire policy should be laid out in the email so I broke down the rules in bullets and included a brief how and why along with the bullet. I also left room for input from everyone not just the people that have been with the company for years, but those new employees that can bring fresh new ideas from other places.
I based the majority of this off of problems I saw while in the military with the miss use of e-mail and the things we put in to place to help train and correct those problems. I always tried to include the senior leadership in the creation and finalizing of policy which will require them to take ownership of and enforce. We also wanted input from junior members and new arrivals that bring in ideas from outside organization. This can be useful in answering question that have already been asked and solved in other companies.
I use material in reference to arguing through e-mail refer to as flaming by G.J. Christensen (Christensen, G.J. (2003). Professional E-mail Needs Attention). This explains that you should never put anything in an e-mail that you would not want on the front page of the Los Angeles Times. These actions also cause conflict within the work place that can cause lack of support later and effect productivity of the company as a whole.
The rest of the ideas for the rules D.G. Jerz E-Mail: Ten Tips for Writing It Effectively. Within this were broke down details from keeping the bottom line of the message up front in the first paragraph. To the fact of answering all of the questions in the e-mail in a timely manner (Jerz, D.G. (2000). E-Mail: Ten Tips for Writing It Effectively).
In all these rules create a guide line for a more efficient, professional work environment that includes employee input.
References
Christensen, G.J. (2003). Professional E-mail Needs Attendion. Accessed from: http://www.csun.edu/~vcecn006/email.html
Jerz, D.G. (2000). E-Mail: Ten Tips for Writing It Effectively. Accessed from: jerz.setonhill.edu/writing/e-text/e-mail.htm

Similar Documents

Premium Essay

Employee Privacy Rights in the Workplace

...share information have forever changed. Employers are playing constant “catch up” with new technologies that are utilized on a broad scale long before policies are created to manage their impacts. Privacy issues often arise in connection with employer efforts to locate, hire and evaluate the most qualified and reliable employees. Improvements in technology, such as the rapid rise of the use of electronic mail and the increasing use of surveillance cameras, often force otherwise reluctant employers to readdress the balance between employees' privacy concerns and perceived business needs. In fact, nearly 67% of all companies currently use some type of surveillance in the workplace. According to a recent poll, “. . . over 66% percent of those surveyed had used the Internet from work in the past 24 hours.” (M.Lee Smith Publishers, Hospitality Workforce Trends, January 2000) In addition, when issues in his or her personal life impact an employee’s work, the employer must make judgments as to the appropriate level of involvement. Lastly, as traffic on the “information superhighway” continues to explode a number of substantive questions about the use and abuse of these information networks arises. What are the ramifications for employees’ right to privacy in the workplace? Does an employer have the right to search an employee’s computer files or review the employee’s electronic mail (“E-mail”)? What are the advantages and disadvantages of using surveillance at the workplace...

Words: 3154 - Pages: 13

Premium Essay

Tgt2 Apps in Network Security Challenge

...Introduction New security policy created for e-mail will ensure e-mails are used for business purpose and limits personal usage of e-mails. Policy also permits Softsearch to monitor employee’s e-mails if required. Controls implemented by e-mail policy will help prevent confidentiality breach. However, e-mail policy does not govern attachments within e-mails. Policy should be enhanced to include e-mail attachment specific statement to prevent employees from opening attachments from unknown source & forwarding such attachments within the company network. Internet policy prohibits employees from visiting indecent, illegal and pornographic sites, participate in online gaming, streaming videos, download pirated software. These measures will reduce Softsearch network’s exposure to virus and hacking attempts. In addition to these prohibitions for internet usage, policy should be enhanced to include prohibitions for social media websites (Facebook, Twitter etc.), online blog, online document stores (Google Drive, DropBox etc) to ensure no private company information is shared. This may expose that can be sent to external e-mail addresses. This may expose Softsearch with confi confidentially if private information is sent to external e-mail addresses. E-mail policy should be enhanced to include statement regarding no attachment policy for external e-mail addresses. Employee’s can e-will be able to and internet usage addresses softsearch policSoftsearch new policy addresses issues...

Words: 1015 - Pages: 5

Premium Essay

E-Mail and Internet Policy

...E-Mail and Internet Policy Darryn Cooper COM/285 Angie Robert August 24, 2011 E-Mail and Internet Policy The integrity of a business relies on communication, both using internal and external communications. E-mails and the internet are two ways that businesses communicate with shareholders, employees and their customers. In today’s global market, the use of computer guidelines and policies have been implemented to ensure that all employees adhere to those policies. Communication via the internet and use of emails should be carefully considered when using it. This essay will discuss why e-mail and internet policies have been put in place. *1Congress passed the Privacy Act of 1974, as amended, (Privacy Act) to safeguard records of information pertaining to individuals that Federal agencies or components own and maintain. The Department of Defense (DoD) policy regarding e-mail and internet use is very strict. All employees who are employed by the DoD are given a Common Access Card (CAC). The CAC is inserted into the computer and requires that you enter a password. At no time should you leave your CAC in the computer when an individual leaves his or her computer. Ashmore ( 2009), " Many federal laws affect employer regulation of email and internet uses, such as the Federal Wiretap Act; the Electronic Communications Privacy Act; and the Stored Communications Act. In addition, state...

Words: 941 - Pages: 4

Premium Essay

Internet

...Internet Mario Robles Com/285 July 13, 2011 Patricia Madrill Internet In my current workplace e-mails are non-existing, e-mails between our company members are avoided and communication is done through cell phone or radio call. Therefore, policies about Internet use are not available and not required in this stage of the company. However, if our company where to provide employees with Internet privileges I can see why they would want to implement Internet policies. With those policies the company enforcing them should be aware that employees would not be completely satisfied with about their privacy and think that their personal business is no longer personal. * What are the e-mail use, Internet use, and privacy policies at your job? * In my current workplace policies about Internet usage are not stringent, reason being everyone in the company has their own laptop. My company, after you have been with them for a year will give you a $1,000 gift card. This gift card is not just free money, it comes with two restrictions. The first restriction is that you should use 75% of this money toward the purchase of a new lap top, the second restriction is that the rest of the money has to be spent on a Verizon wireless card and a two-year subscription fee with a Verizon wireless vendor. Once you have purchase this items if there is any money left you may use...

Words: 1109 - Pages: 5

Free Essay

Credentials

.... . . . . . . .2 Cheryl McKinnon, Hummingbird Ltd. . . . . . . . . . . .4 Records Management: Beyond the Quick Fix There’s a movie playing at my multiplex that warns against placing blind trust in technology, because it’ll getcha in the end. I haven’t seen it yet …” The RM Challenge of Electronic Communications The world of a typical knowledge worker is changing once again. Over the last two decades the technology revolution has broadened access to authoring tools, e-mail and other forms of electronic communication … TOWER Software North America . . . . . . . . . . . . . .6 Randolph Kahn, Esq. & . . . . . . . . . . . . . . . . . . . . . . . . . .8 Barclay T. Blair, Kahn Consulting E-Mail Management: Avoiding the 6 Common Mistakes Information management has become a vital focus for all organizations to address risk mitigation, compliance and overall business continuity … Records Management Redefined: From The Backroom to the Boardroom What is Records Management? Records management is the application of policies, practices, technologies and other management controls … Del Zane and Dean Berg, Stellent . . . . . . . . . . . . .10 Turning Compliance Projects into Business Processes In the not-too-distant past, compliance initiatives often were characterized by back-office operations that involved large volumes of records … Michael McLaughlin, Exact Software . . . . . . . . . . .12 Embracing SOX Compliance with a Coping Strategy It’s nearly a forgone conclusion that at least once...

Words: 22562 - Pages: 91

Premium Essay

April Internet Paper Week5

...Addressing e-mail, Internet use, and privacy policies What are the e-mail, Internet use and privacy policies at your job? The e-mail use at my job is that it can’t be used for personal use, but only company business. Internet use at my job is definitely for business use only. At my job I can’t get on it to shop or pay bills, but only for company business. The privacy policy is your own personal information that you allow your company to have, but you still have right’s. The company can not disclose any of your information. The privacy policy can also help protect you against internet fraud, make sure your computer is safe, and also protect you and your personal information. What are the current laws regulating employee e-mails and internet privacy? One law is the at-will law. This law gives an employer the right to relieve an employee of duty with any explanation what so ever. The employer does not need a reason, you can show up for work one day, and they can let you go without any explanation. Another law is when a company does not allow a union in the company. A union can prevent a employee from being relieved of duty without any just cause. With a union there has to be a valid reason for letting an employee go. Employees have constitutional rights to privacy; it cannot be invaded according to the law. Most companies have the right to retrieve your e-mail and internet use. Why do companies implement e-mail and internet use policies? Most companies implement e-mail and internet...

Words: 1150 - Pages: 5

Premium Essay

Technology Papers

...Employee Privacy Report Rhyan Vee BIS R Alizade The use of the Internet and e-mail within the workplace domains has attained a great deal of significance. This is because employees are being monitored within the workplace realms, in order to check the employees work manifestations and gauge what kind of work they are carrying on, on the Internet. This is important because it divulges the employees thinking mechanisms. I will discuss a few pertinent aspects related with the technological usage within my workplace. E-mail use, Internet use, and Privacy Policies Technological issues at my workplace are handled in a fair and balanced manner. This is why the network architecture has gained importance within my workplace realms. A fact is that the use of technology is within the prescribed rules and standards. The use of e-mail and the Internet is restricted but not so much so that employees are forbidden. They can use it with moderation and hence do their jobs at the same time. The e-mails are exchanged among the company employees on an intranet e-mail system. Similarly blogs and internal websites are made use of that discuss the different aspects of the work on a regular basis. “The workplace limits the use of bandwidth because if more of this is used, serious issues could arise for the entire network” (Zollers, 2003). The use of the Internet is carried out in such a manner that nearly all the network users are shared properly...

Words: 1365 - Pages: 6

Premium Essay

Business Communication Trends Paper

...phone conversations, informal meetings, presentations, e-mail messages, letters, memos, reports, blogs, text messaging, and Web sites” (Locker & Kienzler, 2008, p. 5). Verizon Wireless uses most of these forms of communication to conduct business throughout all the departments. In the area sales operations department my team uses various method to communicate with the headquarters, regions team, and area leadership. In this paper I will discuss the how my team uses old and new communication methods offered within the company to manage their day-to-day work activities. Roles in day-to-day activities at work I manage a team of four and they oversee the retail sales operation for the west area, which consist of Southern California, Northern California, Pacific Northwest w/Hawaii, Mountain, and Southwest regions. As part of the teams daily requirements, they are to communication with each of the regional teams and be a liaison for the area with headquarter in New Jersey. The team major operation consist of retail policy and procedures, customer experience, warranty programs, customer retail self service option, and liaison between the regions with headquarter, marketing, finance, and customer service. The team uses e-mail, conference calls, adhoc meetings, and the company intranet to communicate new policy, product launches and operational tools. The team must know and understand how each audience will interpret the new policy and ensure it is user friendly to both internal and external...

Words: 1127 - Pages: 5

Premium Essay

Week 5 Inf 325

...Between ‘Implementation’ and ‘Policy’ and Describes the Importance of Their Separation Management defines information security policies to describe how the organization wants to protect its information assets. After policies are outlined, standards are defined to set the mandatory rules that will be used to implement the policies. Some policies can have multiple guidelines, which are recommendations as to how the policies can be implemented. Finally, information security management, administrators, and engineers create procedures from the standards and guidelines that follow the policies. This is a major flaw in the linear model because policies often change as they move through bureaucracies to the local level where they are implemented. ‘Implementation always makes or changes policy to some degree’, (Lindblom 1980). ‘Policy implementers interact with policy-makers by adapting new policies, co-opting the embodied project designs or simply ignoring new policies, hence underscoring the fact that implementers are crucial actors whose actions determine the success or failure of policy initiatives’, (Juma and Clarke 1985). Better practice implementation plans are scalable and flexible. They reflect the degree of urgency, innovation, complexity and/or sensitivity associated with the particular policy measure, and provides sufficient detail to support and inform successful implementation. One of the most important effects of the division between policy-making and implementation is...

Words: 1375 - Pages: 6

Premium Essay

Export

...EXPORT PROCESS FLOW, PROCEDURE AND DOCUMENTATION Revised on November 10, 2005 Prepared By: Policy & Planning Small and Medium Enterprise Development Authority Ministry of Industries, Production & Special Initiatives Government of Pakistan www.smeda.org.pk HEAD OFFICE LAHORE REGIONAL OFFICE SINDH REGIONAL OFFICE NWFP REGIONAL OFFICE BALOCHISTAN 6th Floor, L.D.A Plaza, Egerton Road Lahore-54792 Tel: 111-111-456 Fax: (042) 6304926 helpdesk@smeda.org.pk 5th Floor, Bahria Complex 2, M.T.Khan Road, Karachi Tel: (021) 111-111-456 Fax: (021) 5610572 helpdesk-khi@smeda.org.pk Ground floor State Life Building The Mall, Peshawar Tel: (091) 9213046-47 Fax: (091) 286908 helpdesk-pew@smeda.org.pk Bungalow No. 15-A Chaman Housing Scheme Airport Road, Quetta. Tel: (081) 2831702/2831623 Fax: (081) 2831922 helpdesk-qta@smeda.org.pk Export Process Flow, Procedure & Documentation Policy & Planning INDEX 1. Introduction to SMEDA 02 2. Role of Policy and Planning 02 3. Flow Chart 03 4. Introduction 05 5. Selection of a Product 05 6. Opening of an Office 05 7. Registration for Export 05 8. Selection of Market 05 9. Quoting a Price 06 10.Signing of a Contract 06 11.Terms of Delivery 06 12.Financing for Exports 07 13.Packing 07 14.Transport 07 15.Insurance 07 16.Documentation 07 17.Post Shipment Documents 08 18.How to Claim Duty...

Words: 5503 - Pages: 23

Premium Essay

Export Documentation

...EXPORT PROCESS FLOW, PROCEDURE AND DOCUMENTATION Revised on November 10, 2005 Prepared By: Policy & Planning Small and Medium Enterprise Development Authority Ministry of Industries, Production & Special Initiatives Government of Pakistan www.smeda.org.pk HEAD OFFICE LAHORE REGIONAL OFFICE SINDH REGIONAL OFFICE NWFP REGIONAL OFFICE BALOCHISTAN 6th Floor, L.D.A Plaza, Egerton Road Lahore-54792 Tel: 111-111-456 Fax: (042) 6304926 helpdesk@smeda.org.pk 5th Floor, Bahria Complex 2, M.T.Khan Road, Karachi Tel: (021) 111-111-456 Fax: (021) 5610572 helpdesk-khi@smeda.org.pk Ground floor State Life Building The Mall, Peshawar Tel: (091) 9213046-47 Fax: (091) 286908 helpdesk-pew@smeda.org.pk Bungalow No. 15-A Chaman Housing Scheme Airport Road, Quetta. Tel: (081) 2831702/2831623 Fax: (081) 2831922 helpdesk-qta@smeda.org.pk Export Process Flow, Procedure & Documentation Policy & Planning INDEX 1. Introduction to SMEDA 02 2. Role of Policy and Planning 02 3. Flow Chart 03 4. Introduction 05 5. Selection of a Product 05 6. Opening of an Office 05 7. Registration for Export 05 8. Selection of Market 05 9. Quoting a Price 06 10.Signing of a Contract 06 11.Terms of Delivery 06 12.Financing for Exports 07 13.Packing 07 14.Transport 07 15.Insurance 07 16.Documentation 07 17.Post Shipment Documents 08 18.How to Claim Duty...

Words: 5503 - Pages: 23

Premium Essay

Electronic Usage Policy

...Policies of the University of North Texas Health Science Center 04.301 Acceptable Electronic Communications Use Policy Chapter 04 – Administration Policy Statement. The University of North Texas Health Science Center (UNTHSC) provides various electronic communication resources for the purpose of conducting business in support of UNTHSC’s organizational mission. UNTHSC is the legal owner and operator of all electronic communication resources purchased or leased with UNTHSC funds. All electronic records are the property of UNTHSC, not of the individuals creating, maintaining, sending or receiving such data or information. Each person granted access to UNTHSC electronic communication resources and electronic records is responsible for appropriate use as stated within this policy as well as adherence to all applicable federal, state and local laws. UNTHSC reserves the right at any time to limit, restrict or deny access to its electronic communication resources and records, as well as to take disciplinary and/or legal action against anyone who is in violation of this policy or applicable laws. Application of Policy. This document establishes organizational policies and procedures regarding the use of electronic communications. This policy applies to: 1. All electronic communication resources owned, leased, provided and/or managed by UNTHSC; 2. All users and types of use of UNTHSC electronic communication resources; 3. All electronic records generated or maintained in the...

Words: 2663 - Pages: 11

Premium Essay

The Wave System

...F-Secure Client Security Administrator's Guide F-Secure Client Security | TOC | 3 Contents Chapter 1: Introduction.......................................................................9 System requirements..............................................................................................................10 Policy Manager Server.................................................................................................10 Policy Manager Console..............................................................................................10 Main components...................................................................................................................12 Features..................................................................................................................................13 Product registration.................................................................................................................14 Application management........................................................................................................15 Basic terminology...................................................................................................................16 Chapter 2: Installing the product......................................................17 Installation steps.....................................................................................................................18 Download and run the installation...

Words: 31829 - Pages: 128

Free Essay

Job Description

...Enterprise Development Authority Ministry of Industries, Production & Special Initiatives Government of Pakistan www.smeda.org.pk Prepared By: Policy & Planning HEAD OFFICE LAHORE 6th Floor, L.D.A Plaza, Egerton Road Lahore-54792 Tel: 111-111-456 Fax: (042) 6304926 helpdesk@smeda.org.pk REGIONAL OFFICE SINDH 5th Floor, Bahria Complex 2, M.T.Khan Road, Karachi Tel: (021) 111-111-456 Fax: (021) 5610572 helpdesk-khi@smeda.org.pk REGIONAL OFFICE NWFP Ground floor State Life Building The Mall, Peshawar Tel: (091) 9213046-47 Fax: (091) 286908 helpdesk-pew@smeda.org.pk REGIONAL OFFICE BALOCHISTAN Bungalow No. 15-A Chaman Housing Scheme Airport Road, Quetta. Tel: (081) 2831702/2831623 Fax: (081) 2831922 helpdesk-qta@smeda.org.pk Export Process Flow, Procedure & Documentation Policy & Planning INDEX 1. Introduction to SMEDA 2. Role of Policy and Planning 3. Flow Chart 4. Introduction 5. Selection of a Product 6. Opening of an Office 7. Registration for Export 8. Selection of Market 9. Quoting a Price 10.Signing of a Contract 11.Terms of Delivery 12.Financing for Exports 13.Packing 14.Transport 15.Insurance 16.Documentation 17.Post Shipment Documents 18.How to Claim Duty Drawbacks 19.Annexure A 02 02 03 05 05 05 05 05 06 06 06 07 07 07 07 07 08 08 09 1 Export Process Flow, Procedure & Documentation Policy & Planning INTRODUCTION OF SMEDA The Small and Medium Enterprise Development Authority (SMEDA) was established with the objective to provide fresh...

Words: 5504 - Pages: 23

Premium Essay

Employee Privacy Report

...Employee Privacy Report Introduction Using e-mail, the Internet, and privacy policies at an organization is partially what an employee does daily. Properly using the Internet, e-mail and privacy policies is the responsibility of each staff member. Although staff used e-mails to communicate with employees as well as research the Internet for information related to the job, one would expect for certain information to remain private; however, it does not occur like this all the time. Businesses have in place policies where they have the right to observed employees activities during job. While it is important for employees to be mindful of their companies’ policies, it is more important to know that employers have the responsibility to ensure that their employees have been properly inform and made aware of these policies. When an employer provide an employee with a copy of the companies handbooks, the handbook should address such issues as electronic communication and Internet use while on company computers. Additionally, most companies policies states, whether “internet use and communication … are considered part of the company’s business” and “such communication are not to be considered private or personal to any individual employee.” However, some company’s policy also provides, that “occasional personal use is permitted” (Gavejian). What are the e-mail use, Internet use, and privacy policies at your job? Law allows employing organizations to monitor business...

Words: 1297 - Pages: 6