Free Essay

Communication Policy

In: Business and Management

Submitted By elizabethdriver
Words 395
Pages 2
Electronic Communication Policy and Procedures
Policy Statement
The role of the electronic communication policy is to provide clear expectations and mitigate risk. It is important that electronic communication support employees’ business efforts; however, it is imperative that the company ensures employees do not engage in misuse or abuse of the system.
Employees are solely responsible for the information sent, received, and stored on the organizations system; however, the company retains the right to all information. Furthermore, the company has the right to limit, restrict, deny, and view all electronic communication. To maintain privacy and the integrity of the system, the company expects employees to utilize passwords to enter the system and encrypt all communication that has personally identifiable information. To save energy, the company requires employees to turn off computers at the end of each workday. Moreover, the company maintains the right to monitor and audit all systems and electronic communication without prior notification.
The electronic communication policy and procedures apply to all company employees.
The company expects employees to abide by the following procedures regarding electronic communication: 1. Maintain the security of passwords to enter the organization’s system. The company strictly prohibits employees from attempting to use another individual’s password or account. 2. Limit personal use to breaks and outside the scheduled work period. Personal use is acceptable as along as it does not interfere with the employee’s productivity or interrupt or slow down the network. 3. Understand and acknowledge that their activity may be monitored. 4. Report abuse or illegal activity. 5. Scan all e-mails and attachments for viruses, worms, Trojan horses, or trap doors. If a scan indicates a potential threat, the employee must report the threat to the Information Technology Department immediately. 6. Avoid sending emails larger than 10MB to avert interrupting or slowing the network. 7. Encrypt and digitally sign all emails containing personally identifiable information.
The company strictly prohibits the following activities: 1. Sending chain mail, spam, solicitations, advertisements, or commercial emails not intended for the company’s benefit. 2. Conducting illegal activities or gambling. 3. Sending electronic communication that intends to harass, intimidate, threaten, embarrass, humiliate, or degrade another individual. 4. Sending electronic communication that contains obscenities, pornography, racist, sexist, or disparaging material regarding race, origin, sex, sexual orientation, age, disability, religion, or political beliefs. 5. Downloading or installing software. 6. Accessing social media sites.

Similar Documents

Premium Essay

Electronic Communications Policy

...Electronic Communications Policy Introduction: In today’s fast paced and ever-changing economic environment, electronic communication tools are heavily relied on and recognized as an enormous company asset. Electronic communications equipment and services include internal and external electronic mail (e-mail), facsimiles, telephone systems, voice mail, internet access, cellular phones, as well as computer networks, files, hardware and software. While we encourage the use of these company resources, it is important to note they should only be used for their intended purposes and in a manner in which their integrity and performance is protected. “Company” will continually monitor the use of all company assets. Purpose: The guiding purpose of “Company’s” electronic communications policy is to set forth the expected standards of conduct, rules, restrictions, procedures, and disciplinary actions surrounding their use. Abuse and misuse of electronic communication tools potentially puts both the company and employees at risk. In an effort to minimize risks, “Company” is responsible for securing its electronic communications system against unauthorized access, prohibited uses, abuse, and violation of local, state, federal, and international laws. In addition, we will ensure any applicable electronic communications will be retained in accordance with any applicable laws. Employee acknowledgement and consent is required. Scope: The electronic communications policy applies......

Words: 806 - Pages: 4

Free Essay

Policy Making

...Equalities Impact Assessment Corporate Communication Strategy and Action Plan Date: March 2009 EQUALITY IMPACT ASSESSMENT Equality Impact Assessment - Policies | | | |Title of policy being assessed: |Corporate Communication Strategy/Action Plan | |Department and Section: |Chief Executive’s | | |Public Relations | |Names and roles of officers completing this assessment: |Head of Public Relations | |Contact Telephone Numbers: |0116 305 6272 | |Date assessment completed: |5th March 2009 | |Defining the policy | | ...

Words: 2097 - Pages: 9

Premium Essay

Best Ever

...Salix Pharmaceuticals Security Policy Introduction The Salix Pharmaceuticals Security Policy Template is for the use of creating a strong security policy. Each sub policy contains a title with a description and a brief summary of what the certain section will contain. The purpose of the security policies is to ensure that Salix Pharmaceuticals is safe and under strong commands. The Salix Pharmaceutical Security Policy should be reviewed when new materials and changes are to be preceded amongst this company. Scope Salix Pharmaceuticals security policy will keep the company running for years if followed by the procedures. Following the sub policies will lead to a successful company that will be ran smooth and processed like no other company. Antivirus, encryption, passwords, and backups will protect this company like no other before. Purpose Salix purpose for the security template is to have the company, employees, managers, assistant manager, and volunteer’s, and temporary follow all these policies to make the company operate under a easy and fast pace. By making this policy the company should be protected from several things and kept up to date on every policy. Employees should obey this policy and read over every so often in case changes and updates are needed to be added. Acceptable Use Workers must report any signs of violation and a misunderstanding of the policies. Workers are not allowed to access any information they do not have the authority to......

Words: 1087 - Pages: 5

Free Essay

Sample Proposal in Academic Setting

...Members of the Operation’s Committee School of Communication University of Asia and the Pacific Pearl Drive, Ortigas Center Pasig City, Philippines 1600 Dear Sir/Madam: Good Day! I am Donica Jane T. Villar, a sophomore student taking Integrated Marketing Communications (IMC) in University of Asia and the Pacific. I am currently enrolled in Understanding Media and its Content (COM20) and Business Communication (COM21) under Ms. Veronica Isla and Ms. Shirin Eugenio, respectively. Both subjects have a class of fifty students. This kind of situation may most likely affect a student’s learning. With a large number of students in a class, most of the students cannot concentrate because some might be making unnecessary noise and movements. The aforementioned scenarios will result to the destruction of a class. I am writing to propose unique, effective, yet fair ways to promote discipline and proper classroom behavior and the possible actions that can be taken to ensure unruly behavior is minimized in a large class. I came up with operative solutions and attainable actions to the aforementioned situations. THE PROBLEM In every educational institution, discipline is very important. Every class should have a proper atmosphere to attain knowledge and to enable the students focus on their schooling. Discipline is essential to an academic growth and class’s harmony and success. Without discipline, especially in a Communication class of fifty students, each individual is......

Words: 741 - Pages: 3

Premium Essay

Computer Information System Brief Kudler Fine Foods

...facilitate any technology changes needed to decrease the chances of growing pains in the foreseeable future. Keeping Kudler Fine Foods in a competitive position through technological growth will allow the company to expand and persevere in hard economic times. Kudler Fine Foods has three stores that are all connected through a T3 dedicated line. This allows all stores to remain in proper communication with the other stores and helps each store assist the others when needed. Strengths Kudler Fine Foods has many strengths in their information systems. The Retail Enterprise Management System (REMS) that Kudler Fine Foods received from Smith Systems Consulting laid the groundwork for an effective information system however; there are areas of needed improvement. The REM system came with a General Ledger module, Accounts Payable module, Point of Sale module, Bank Reconciliation module, and installed backup generators to assist in times of power failure. Kudler Fine Foods also has a dedicated T3 line that connects all 3 of their stores together. This line allows to effortless communication between administration and their stores so that information is ready quickly and easily when needed. Weaknesses and Solutions With all the strengths of Kudler Fine Foods, there are multiple areas of advancement needed to assist Kudler Fine Foods in their everyday business activities to make them more competitive in their market. These changes and updates should be taken under serious......

Words: 1049 - Pages: 5

Free Essay

Benziger Family Winery Case Analysis to answer this question, I must assess and evaluate the information provided in this case. I will start with an assessment of the EMS Gap Analysis which is a checklist consistent with ISO 14001 requirements. This checklist is in the form of questions ask such things as what is their policy, and provide documentation such as records, actions, and management review. At first glance it seems as though Benziger Family Winery leaves a lot to be desired in the way of completing these goals, but upon further inspection it is apparent that the winery has taken great steps towards completion of these goals and only need to follow through on most of the activities already begun. For instance, the communication plan, EMS documentation and writing of the SOPs have all begun but have aspects that are still in development. I believe that in order to complete these steps, effective time management will help the winery become successful in the completion of the EMS Gap Analysis. When looking at their environmental management cases and comparing them to their environmental goals I noticed that some of them coincide and others do not. For instance, Benziger has developed an environmental policy specifically stating...

Words: 856 - Pages: 4

Premium Essay

Crticise Englishnization at Rkuten the market and can conduct global business easier. On the other hand this policy made more pressure on the employees, miscommunication, less productivity and lead to employee frustration and decrease their morale. 2- Mikatani wants his company to catch up with the global business. He wants Rakuten to become the world number one company in internet services and to acquire many international companies from his experience he knows that English is the global business language, so he wants the company to run completely in English to ensure proper global communication with the whole world. 3- According to the results of the survey in exhibit 3, employees experience the new mandates according to their previous language background. Most of Japanese native speakers saw this new policy as a threat and don’t like it, even they become more afraid of losing their jobs. But for those English speakers and other foreigners they found it a good policy for them. They already know this language and they will become more important in the organization with that policy. 4- The productivity of employees is one of the determinants of acceptance. In the case they show lesser productivity so I think this one indicator of rejecting this policy. Also improvement in the score of TOIFC will be one of the determinants. Very close to the deadline many of employees still don’t have a good score. Also the time of communication between different staff. 5- Mikatani had a good vision but not......

Words: 462 - Pages: 2

Premium Essay

Bus303 Business Communication

...Touro University International BUS303/MOD1/Case Assignment Dr. Gregory Herbert Create an email (about 450 words) to all your employees to announce an email policy you have just created. You are not persuading: you are announcing. However, you must be tactful and professional. Remember: some of those folks have been around along time and some are beginning their very first jobs. This section of the assignment should include references, properly cited, to articles on the CD. From: William Layne To: Army Bank All 14 October 2008 Subject: Email Policy effective immediately All: Implement the following practices immediately for all internal emails: Subject line will contain the point of the email. You are busy people in a high paced environment. You want to be able to gage the importance of the hundreds of emails you receive in order to prioritize them for maximum efficiency. Email will not be used to begin new projects and collaborations. Face to face meetings will be use to begin all new projects and collaborations. Teams achieve cohesion and synergy by feeding from each other’s energy. You are among the finest work forces around and achieve greater results from actual human interaction with your team mates. Manager or Associate is the title to be used when referring to employees in email traffic. We are an equal opportunity bank and we only see one color, the color of money. Identifying our team members by gender......

Words: 693 - Pages: 3

Free Essay

Psycologey programs that highlight the negative effects of drug abuse as well as provide treatment on demand for victims. Introduction: A. Drug Abuse B. Joblessness C. Poor Parenting Body of Presentation: Drug abuse: Increasing awareness on negative effects of drug abuse. (Hanson, Venturelli, & Fleckenstein, 2008) Ignorance (Donohew, Sypher, & Bukoski, 1991) Joblessness: Government poor policies Retrenchments that leave many jobless Poor Parenting: Young adults brought up in broken homes Young adults from orphanages Summary Drug abuse is one of the leading challenges that face young adults. It is a result of Ignorance amongst users about drugs and negative effects iDonohew,Sypher, & Bukoski, 1991) This can be resolved by increasing awareness on the negative effects of drug abuse. (Hanson, Veturelli, & Fleckenstein, 2008). Another challenge faced by young adults is joblessness. Joblessness is caused by poor government policies or reluctance to implement existing policies (Fernando, 2011). It can also be caused by measures taken by companies to retrench workers to either make more profits or caution the companies from collapsing. Poor parenting is also another challenge faced by young adults (Golombok, 2000). In some instances, young adults have been brought up in the hardships of orphanages as a result of abandonment by their parents (Shepard, 2009). Conclusion ; This outline has......

Words: 360 - Pages: 2

Premium Essay

Rua for Collaborative Health Week 2

...situation because the ethics committee went so far as to threaten the parents about calling CPS. This step may have not been necessary. The ANA/ICN code of ethics that was being violated was autonomy. Autonomy is the ethical principle that allows patients to choose their own medical care and make their own decisions. Since the patient was minor full autonomy was not initially given to the patient. The ethics committee ruled in favor of the adolescent and bypassed the rule regarding minors. DB #2 One of the current health policy priorities for Maryland is nurse staffing plans and ratios. Maryland is one of the many states that do not have enacted legislation or adopted regulations for staffing ratios. If this were to be supported then many benefits would come to nurses, patients and providers. Nurses would be able to provide more quality care to their patients and less patient care errors would occurs. Safety would increase. Communication between providers may be better due to a more manageable work load. I would first...

Words: 576 - Pages: 3

Premium Essay

Case Study - It Horror Disaster

...CASE PREPARATION CHART Student Name | LOO LIAN VEE | Student ID | 1112700203 | Submission date | 20 APRIL 2016 | Case title | THE GREAT IT HORROR STORY | Section | AC 02 | ------------------------------------------------- ------------------------------------------------- ASSESSMENT To be filled by facilitator Components | Scores | Scores | | 1 mark | 2 marks | 3 marks | 4 marks | | Completeness of case chart | Case chart is incomplete | Some of the case chart requirements are met satisfactorily. | Most of the case chart requirements are met satisfactorily. | All case chart requirements is met satisfactorily. | | Submission | On-time submission | N/A | N/A | N/A | | TOTAL | | Synopsis This story of Craven Books tells us about how a computer project, an IT implementation drove one company almost to bankruptcy. Craven Books is a distributor of comics and magazines, and books. The company was founded in 1960 by Peter Craven as he started to distribute sci-fi and horror books through direct mail. In 1970s, the business began well known in the marketplace by buying comics in bulk from both the American publishers and the second hand comic market and sell this on their customers in the United Kingdom by using a mail order catalogue. In the 1990s, the company was at the peak of it success and was looking to expand their business; to do so, it was decided the company should have an efficient distribution system, and that’s why Craven......

Words: 2413 - Pages: 10

Premium Essay

Lobbyists And Interest Groups Essay

...groups in Texas have a huge amount of money to spend on political affairs and they can easily control the policy making process. Due to that, the voice of the general public is suppressed as lobbyist spend a huge amount of money on members of the legislator to influence them and make the law in favor of what they wanted. This ultimately means those groups who can spend more money can influence the government to adopt the policies that the group members wanted. The general public cannot fund enough to the member’s campaign so their views and interest are not given priority due to the influence of the big interest groups. There should be tougher rules on what lobbyist can do and their funding so that the policies favored by the general public are also adopted. Lobbyist groups have a huge amount of money. If we people are limited on what we...

Words: 718 - Pages: 3

Premium Essay

It255 Final Project

...Project part.2 Corporate security policy (7) Dear Richman Investments Senior Management – It has come to my attention that your corporate security policy for the firm is out of date and that it needs to be updated. In my time here as an intern I have reviewed the security policy and revised it to keep up with all of the technological updates going on in the internet world today. I was assigned this project and being that we have 5000 employees operating in different locations and different parts of the country; I have noticed that some of the other branches do not follow the firms’ policies as they should. Some branches operate on their own policies. I have drafted up a new and improved corporate security policy that covers emails, mobile devices, computer usage, email retention policies, passwords, etc. I hope this will help streamline our security policy across the board so that everyone is on the same page and so there is no misinterpretation of the firm employee or otherwise. RICHMAN INVESTMENTS CORPORATE SECURITY POLICY Use of Phone and Mail Systems Personal use of the telephone for long-distance and toll calls is not permitted. Employees should Practice discretion when making local personal calls and may be required to reimburse The Firm for any charges resulting from their personal use of the telephone. The mail system is reserved for business purposes only. Employees should refrain from sending or receiving personal mail at the workplace. To...

Words: 1596 - Pages: 7

Premium Essay

Is 4550 Security Policies and Implementation

...World Bank Savings and Loan must be in compliance with the Gramm-Leach-Bliley Act (GLBA) which protects the customer and requires the financial institution to explain their information sharing practices to their customers and safeguard sensitive data and the Sarbanes-Oxley Act (SOX) which requires top management to certify the accuracy of financial information. To enhance security you will need to implement PCI DSS. This is a security measure that has been designed to protect cardholder data and applies to all entities involved in payment card processing. To protect the network from security breaches and insure that customer information remains secure, an appropriate security policies must put in place for employees and third party vendors so they will know what they are allowed to access. These policies will apply to regular users starting with physical access, what and which documents employees are authorized to access on their computers, Internet access, to let users know and understand what is considered unauthorized Internet...

Words: 374 - Pages: 2

Premium Essay

Bsbadm504B Plan and Implement Administration System

...See specifications below for details. Performance objective In this assessment task you will demonstrate skills and knowledge required to plan or review administration systems and implement new or modified administration systems. Assessment description Within a real or simulated business context, you will plan a new administration system or review an existing system. You will need to: ● consult with users or stakeholders to develop a detailed specification for the new or revised system, which must meet both organisational needs and external requirements such as codes of practice or legislation ● follow organisational procurement policies to select an appropriate developer or supplier ● prepare detailed planning for the implementation of the system, including communication, training and risk management activities. Procedure 1. In consultation with your assessor, nominate (a) an appropriate workplace context and (b) an administration systems project to undertake to meet assessment requirements set out in this document. You may choose: ○ the creation of a...

Words: 1683 - Pages: 7