Premium Essay

E-Mail and Internet Policy

In: Business and Management

Submitted By coops3904
Words 941
Pages 4
E-Mail and Internet Policy Darryn Cooper COM/285 Angie Robert August 24, 2011

E-Mail and Internet Policy The integrity of a business relies on communication, both using internal and external communications. E-mails and the internet are two ways that businesses communicate with shareholders, employees and their customers. In today’s global market, the use of computer guidelines and policies have been implemented to ensure that all employees adhere to those policies. Communication via the internet and use of emails should be carefully considered when using it. This essay will discuss why e-mail and internet policies have been put in place.

*1Congress passed the Privacy Act of 1974, as amended, (Privacy Act) to safeguard records of information pertaining to individuals that Federal agencies or components own and maintain. The Department of Defense (DoD) policy regarding e-mail and internet use is very strict. All employees who are employed by the DoD are given a Common Access Card (CAC). The CAC is inserted into the computer and requires that you enter a password. At no time should you leave your CAC in the computer when an individual leaves his or her computer.

Ashmore ( 2009), " Many federal laws affect employer regulation of email and internet uses, such as the Federal Wiretap Act; the Electronic Communications Privacy Act; and the Stored Communications Act. In addition, state privacy laws and court decisions must be considered in preparing computer-use policies.” ( Regulating Employee Email, para. 1). The laws regulating employees e-mail and internet use vary from state to state. California

*2

The policy prohibits the use of any outside laptops, zip drives and other means to connect to your workstation. These devices could

Similar Documents

Premium Essay

E-Mail, Internet and Privacy Policies

...Running Header: E-MAIL, INTERNET, AND PRIVACY POLICIES E-Mail, Internet and Privacy Policies University of Phoenix Com 285: Introduction to Business Communication Group: MEBSB039 May 5, 2009 E-Mail, Internet and Privacy Policies With the invention of the internet, many conveniences have been developed to help companies run more efficient. E-Mail was developed to replace standard written messages. This form of communication sped up the receipt of messages from one person to another. Internet and e-mail have become, and will remain a necessary tool for the modern business to succeed. The internet is also used as a way to communicate globally. For instance, a company with offices in the United States and the United Kingdom, now has the ability communicate information at the speed of light. With the advancement of modern technology comes the advancement of ways to steal information and violate the privacy of an employee or the company. Companies have put privacy policies in place to protect employees and the company. Information that could be misused and potentially harm the employee or put the company at risk could easily be sent over the internet through unsecured means. This paper is meant to discuss e-mail, internet use, and privacy policies at the place of employment of the writer. Secondly, we will discuss the laws put in place to regulate employee’s e-mail and internet policies. Thirdly, we will discuss the reasons...

Words: 972 - Pages: 4

Premium Essay

Internet and Email Aups

...E-mail Acceptable Use Policy Purpose E-mail is a critical mechanism for business communications at Richman Investments. However, use of Richman Investments’ electronic mail systems and services are a privilege, not a right, and therefore must be used with respect and in accordance with the goals of Richman Investments. The objectives of this policy are to outline appropriate and inappropriate use of Richman Investments’ e-mail systems and services in order to minimize disruptions to services and activities, as well as comply with applicable policies and laws. Scope This policy applies to all e-mail systems and services owned by Richman Investments, all e-mail account users/holders at Richman Investments (both temporary and permanent), and all company e-mail records. Account Activation/Termination E-mail access at Richman Investments is controlled through individual accounts and passwords. Each user of Richman Investments’ e-mail system is required to read and sign a copy of this E-mail Acceptable Use Policy prior to receiving an e-mail access account and password. It is the responsibility of the employee to protect the confidentiality of their account and password information. All employees of Richman Investments will receive an e-mail account. E-mail accounts will be granted to third-party non-employees on a case-by-case basis. Possible non-employees that may be eligible for access include: • Contractors. • Employees. • Interns. Applications for these temporary...

Words: 1904 - Pages: 8

Premium Essay

Internet

...Internet Mario Robles Com/285 July 13, 2011 Patricia Madrill Internet In my current workplace e-mails are non-existing, e-mails between our company members are avoided and communication is done through cell phone or radio call. Therefore, policies about Internet use are not available and not required in this stage of the company. However, if our company where to provide employees with Internet privileges I can see why they would want to implement Internet policies. With those policies the company enforcing them should be aware that employees would not be completely satisfied with about their privacy and think that their personal business is no longer personal. * What are the e-mail use, Internet use, and privacy policies at your job? * In my current workplace policies about Internet usage are not stringent, reason being everyone in the company has their own laptop. My company, after you have been with them for a year will give you a $1,000 gift card. This gift card is not just free money, it comes with two restrictions. The first restriction is that you should use 75% of this money toward the purchase of a new lap top, the second restriction is that the rest of the money has to be spent on a Verizon wireless card and a two-year subscription fee with a Verizon wireless vendor. Once you have purchase this items if there is any money left you may use...

Words: 1109 - Pages: 5

Premium Essay

April Internet Paper Week5

...Addressing e-mail, Internet use, and privacy policies What are the e-mail, Internet use and privacy policies at your job? The e-mail use at my job is that it can’t be used for personal use, but only company business. Internet use at my job is definitely for business use only. At my job I can’t get on it to shop or pay bills, but only for company business. The privacy policy is your own personal information that you allow your company to have, but you still have right’s. The company can not disclose any of your information. The privacy policy can also help protect you against internet fraud, make sure your computer is safe, and also protect you and your personal information. What are the current laws regulating employee e-mails and internet privacy? One law is the at-will law. This law gives an employer the right to relieve an employee of duty with any explanation what so ever. The employer does not need a reason, you can show up for work one day, and they can let you go without any explanation. Another law is when a company does not allow a union in the company. A union can prevent a employee from being relieved of duty without any just cause. With a union there has to be a valid reason for letting an employee go. Employees have constitutional rights to privacy; it cannot be invaded according to the law. Most companies have the right to retrieve your e-mail and internet use. Why do companies implement e-mail and internet use policies? Most companies implement e-mail and internet...

Words: 1150 - Pages: 5

Premium Essay

Technology Papers

...Employee Privacy Report Rhyan Vee BIS R Alizade The use of the Internet and e-mail within the workplace domains has attained a great deal of significance. This is because employees are being monitored within the workplace realms, in order to check the employees work manifestations and gauge what kind of work they are carrying on, on the Internet. This is important because it divulges the employees thinking mechanisms. I will discuss a few pertinent aspects related with the technological usage within my workplace. E-mail use, Internet use, and Privacy Policies Technological issues at my workplace are handled in a fair and balanced manner. This is why the network architecture has gained importance within my workplace realms. A fact is that the use of technology is within the prescribed rules and standards. The use of e-mail and the Internet is restricted but not so much so that employees are forbidden. They can use it with moderation and hence do their jobs at the same time. The e-mails are exchanged among the company employees on an intranet e-mail system. Similarly blogs and internal websites are made use of that discuss the different aspects of the work on a regular basis. “The workplace limits the use of bandwidth because if more of this is used, serious issues could arise for the entire network” (Zollers, 2003). The use of the Internet is carried out in such a manner that nearly all the network users are shared properly and there...

Words: 1365 - Pages: 6

Premium Essay

Employee Privacy Rights in the Workplace

...changed. Employers are playing constant “catch up” with new technologies that are utilized on a broad scale long before policies are created to manage their impacts. Privacy issues often arise in connection with employer efforts to locate, hire and evaluate the most qualified and reliable employees. Improvements in technology, such as the rapid rise of the use of electronic mail and the increasing use of surveillance cameras, often force otherwise reluctant employers to readdress the balance between employees' privacy concerns and perceived business needs. In fact, nearly 67% of all companies currently use some type of surveillance in the workplace. According to a recent poll, “. . . over 66% percent of those surveyed had used the Internet from work in the past 24 hours.” (M.Lee Smith Publishers, Hospitality Workforce Trends, January 2000) In addition, when issues in his or her personal life impact an employee’s work, the employer must make judgments as to the appropriate level of involvement. Lastly, as traffic on the “information superhighway” continues to explode a number of substantive questions about the use and abuse of these information networks arises. What are the ramifications for employees’ right to privacy in the workplace? Does an employer have the right to search an employee’s computer files or review the employee’s electronic mail (“E-mail”)? What are the advantages and disadvantages of using surveillance at the workplace? As you will read in detail...

Words: 3154 - Pages: 13

Premium Essay

Ethics

...SAMPLE INTERNET USAGE POLICY Policy: Access to the Internet through the Company is a privilege. Users granted this privilege must adhere to strict guidelines concerning the appropriate use of this information resource. Users who violate the provisions outlined in this document are subject to disciplinary action up to and including termination. In addition, any inappropriate use that involves a criminal offense will result in legal action. All users are required to acknowledge receipt and understanding of guidelines contained in this document. Purpose: To define policies and procedures for access to the Internet through the Company network infrastructure. Scope: This policy applies to all personnel with access to Internet and related services through the Company network infrastructure. Internet Related services include all services provided with the TCP/IP protocol, including but not limited to Electronic Mail (e-mail), File Transfer Protocol (FTP), Gopher, and World Wide Web (WWW) access. Procedure: 1. ACCEPTABLE USE 1. Access to the Internet is specifically limited to activities in direct support of official Company business. 2. In addition to access in support of specific work related duties, the Company Internet connection may be used for educational and research purposes. 3. If any user has a question of what constitutes acceptable use he/she should check with their supervisor for additional guidance. Management or supervisory...

Words: 1375 - Pages: 6

Premium Essay

Acceptable Use Policy

...Assignment: Create an Internet and Email Acceptable Use Policy Course Foundations of Computer security Instructor: Amanda Lawrence Cooley Investments is an organization based upon client trust and confidentially. Without the trust placed in the organization by the clients, the organization will cease to exist. As such, every employee should consider their daily actions and the correlation of those actions to the trust placed in the company by the clients. Just as “Employee Smith” would safeguard his home computer against a malware attack, so should he protect the company’s computer from a malware attack. The following will outline the acceptable use of Cooley’s assets regarding Internet and email access and the actions that are prohibited. Cooley Investment’s computers, computer files, e-mail system, Internet access and any software furnished to employees are company property and subject to monitoring and unannounced review. They are to be used for company business only, and not for excessive personal use to communicate with friends or family or to access the Internet for personal purposes. While use of the computer, e-mail and Internet is intended for job-related activities, incidental and occasional brief personal use is permitted within reasonable limits so long as it does not interfere with the employee's work. The company specifically prohibits the use of computers (including Internet access) and the e-mail system in ways that are disruptive, offensive to...

Words: 805 - Pages: 4

Premium Essay

4.3 Acceptable Use Policy Definition

...4.3 Acceptable Use Policy Definition Richman Investments Internet Policy Policy: Access to the Internet through the Richman Inverstments is a privilege. Users granted this privilege must adhere to strict guidelines concerning the appropriate use of this information resource. Users who violate the provisions outlined in this document are subject to disciplinary action up to and including termination. In addition, any inappropriate use that involves a criminal offense will result in legal action. All users are required to acknowledge receipt and understanding of guidelines contained in this document. Purpose: To define policies and procedures for access to the Internet through the Richman Inverstments network infrastructure. Scope: This policy applies to all personnel with access to Internet and related services through the Richman Inverstments network infrastructure. Internet Related services include all services provided with the TCP/IP protocol, including but not limited to Electronic Mail (e-mail), File Transfer Protocol (FTP), Gopher, and World Wide Web (WWW) access. Procedure: 1.0 ACCEPTABLE USE 2.1. Access to the Internet is specifically limited to activities in direct support of official Richman Inverstments business. 2.2. In addition to access in support of specific work related duties, the Richman Inverstments Internet connection may be used for educational and research purposes. 2.3. If any user has a question of what constitutes acceptable...

Words: 669 - Pages: 3

Premium Essay

Employee Privacy Report

...Employee Privacy Report Introduction Using e-mail, the Internet, and privacy policies at an organization is partially what an employee does daily. Properly using the Internet, e-mail and privacy policies is the responsibility of each staff member. Although staff used e-mails to communicate with employees as well as research the Internet for information related to the job, one would expect for certain information to remain private; however, it does not occur like this all the time. Businesses have in place policies where they have the right to observed employees activities during job. While it is important for employees to be mindful of their companies’ policies, it is more important to know that employers have the responsibility to ensure that their employees have been properly inform and made aware of these policies. When an employer provide an employee with a copy of the companies handbooks, the handbook should address such issues as electronic communication and Internet use while on company computers. Additionally, most companies policies states, whether “internet use and communication … are considered part of the company’s business” and “such communication are not to be considered private or personal to any individual employee.” However, some company’s policy also provides, that “occasional personal use is permitted” (Gavejian). What are the e-mail use, Internet use, and privacy policies at your job? Law allows employing organizations to monitor business...

Words: 1297 - Pages: 6

Free Essay

Business

...employees are expected to use Internet, Social Media and E-mail systems effectively and responsibly and in accordance with approved operational and security standards while in the course of their work. Employees equally have a responsibility to ensure that their private use of internet, social Media and e-mail out with the workplace does not impact adversely on the council and its business, compromise their contractual relationship with the council or breach council policy. This policy sets out the expected standards of internet, social media and email use and provides for those standards to be monitored and enforced. The content should be read in conjunction with the relevant employment policies referred to in this document together with other policies and guidance issued by the council’s IT Service, in particular the Data Protection and Information Security Policies. The key aims of the policy are to: * Regulate and control access to the council’s internet, social media and e-mail system networks; * Promote efficient and effective use of internet, social media and e-mail facilities while allowing reasonable and limited personal use in an employee’s own time; * Set standards for the proper secure and lawful use of internet, social media and e-mail in order to minimise and manage the potential risks to the council from inappropriate and illegal use; * Provide employees with guidance on their responsibilities when accessing the internet via the council networks...

Words: 481 - Pages: 2

Premium Essay

Enployee Privacy Report

...monitor almost every aspect of their employee’s job including the time he, or she, arrive to the office, telephone use, Internet use, computer terminals, and voicemail. This kind of monitoring is virtually unregulated, therefore, unless it is stated in the company policy, an employer has the right to listen, watch, and read most an employees workplace communications. The e-mail policy at Dell Services Federal Government (DSFG) is lax, whereas, the company would like the majority of communication to be work-related; employees are allowed to communicate with others for personal use as well. This policy is covered in our handbook, it simply states that if one wishes to keep information private do not store or transmit information on company systems. Private e-mail accounts have been blocked from our server so use of personal e-mail is not permitted. Similar to the e-mail policy, the company wants the internet to be used majority for work-related business. However, short personal business such as paying a bill, making a purchase, locating something, or other small personal business is permitted. During the employees lunch hours, all are allowed to surf the net and visit networking sites such as Facebook, Myspace, and Twitter. There are a few sites blocked that employees are not allowed to access such as Xbox.com (one of the competitors of Dell), all personal e-mail accounts (Gmail, Hotmail, Yahoo, and etc.) and all obscene and offensive sites are strictly forbidden. The company would...

Words: 1111 - Pages: 5

Premium Essay

It255 Final Project

...Project part.2 Corporate security policy (7) Dear Richman Investments Senior Management – It has come to my attention that your corporate security policy for the firm is out of date and that it needs to be updated. In my time here as an intern I have reviewed the security policy and revised it to keep up with all of the technological updates going on in the internet world today. I was assigned this project and being that we have 5000 employees operating in different locations and different parts of the country; I have noticed that some of the other branches do not follow the firms’ policies as they should. Some branches operate on their own policies. I have drafted up a new and improved corporate security policy that covers emails, mobile devices, computer usage, email retention policies, passwords, etc. I hope this will help streamline our security policy across the board so that everyone is on the same page and so there is no misinterpretation of the firm employee or otherwise. RICHMAN INVESTMENTS CORPORATE SECURITY POLICY Use of Phone and Mail Systems Personal use of the telephone for long-distance and toll calls is not permitted. Employees should Practice discretion when making local personal calls and may be required to reimburse The Firm for any charges resulting from their personal use of the telephone. The mail system is reserved for business purposes only. Employees should refrain from sending or receiving personal mail at the workplace. To ensure...

Words: 1596 - Pages: 7

Premium Essay

Employee Privacy Act Report

...report I will be discussing the current privacy policies at Abacus Technology Corporation. I will be going over the policies that Abacus Technology has in place regarding e-mail use and internet use. As well as reviewing the current laws that the State of Maryland has regarding employee e-mail and internet privacy. I will also be discussing why companies implement e-mail and internet use policies. Lastly, I will be covering what assumptions employees might make about their privacy at work and how the policies that are in place can affect an employee’s privacy at work. At Abacus Technology electronic communication such as e-mail and internet use is encouraged, however, electronic communications are considered company property and their purpose is only to be used for company business. The policy on electronic communication relates to all electronic media and services, which are accessed using company computer equipment, while on company premises, or by company-paid access methods, and used in a manner which identifies the individual with the company. Employees are not supposed to use electronic communications for excessive personal use, soliciting non-company business, and conducting activities that are illegal or contrary to the firm’s best interest. Individuals are also asked not to access criminal websites or transmit any harassing or offensive material. Any violations of the company’s electronic communication policy will result in disciplinary actions up to and including...

Words: 1107 - Pages: 5

Premium Essay

Monitoring Employees on Networks

...Monitoring Employees on Networks How does e-mail benefit an organization? Why might an organization want to limit how an employee uses e-mail during work hours? What is an e-mail’s path once it leaves an organization? * E-mail enables messages to be exchanged from computer to computer, with capabilities for routing messages to multiple recipients, forwarding messages, and attaching text documents or multimedia files to messages. Nearly 90 percent of U.S workplace has employees communicating interactively using chat or instant messaging tools. Many online retail businesses offer chat services on their Web sites to attract visitors, to encourage repeat purchases, and to improve customer service. Organizations want to limit their employees from using e-mail or the internet during work hours because it’s considered an interruption that distracts the employee from doing their job tasks that they are supposed to be preforming. Managers worry about the loss of time and employee productivity when employees are focusing on personal rather than company business. Too much time on personal business, on the Internet or not, can mean lost revenue or overbilled clients. If personal traffic on company networks is too high, it can also clog the company’s network so that legitimate business work cannot be performed. When employees use e-mail or the Web at employer facilities or with employer equipment, anything they do, including anything illegal carries the company’s name. Companies also...

Words: 952 - Pages: 4