SlideShare a Scribd company logo
1 of 15
An email policy for your employees
A clear email policy helps prevent timewasting, protects data
security and minimises the risk of legal
problems. As well as setting out how employees can use email,
the policy should cover any email
monitoring you intend to carry out.
Permitted use
Content
Sending emails
Receiving emails
Monitoring email
Implementation
1. Permitted use
Employees should primarily use company email systems for
business
It is pragmatic to allow some personal use of email,
especially if you have employees who use their email for
business purposes
outside of normal working hours.
messages into specific business and personal folders.
Limit personal use
You might prohibit:
allowing other people to access their email
account.
For example, harassing someone by email might be a clear
violation of your email policy.
Set out when email should and should not be used
Set out what devices employees may use to send and receive
email
company email account?
Mobile devices
It is common for employees to send and receive emails from
mobile devices, like smart phones and tablets.
In general, the same guidelines apply no matter where or how
employees access emails
on personal use of email if they stay in touch via their mobile
device outside of office hours.
The biggest issue with mobile devices is security
before emails can be viewed.
remotely if a device is lost or stolen.
across all devices.
This ensures employees can always access emails, even if they
lose
1
http://production.dev.atomcontentmarketing.co.uk/law/finance-
and-strategy/dealing-with-insolvency/subsidised-and-
guaranteed-loans#EPYE1
http://production.dev.atomcontentmarketing.co.uk/law/finance-
and-strategy/dealing-with-insolvency/subsidised-and-
guaranteed-loans#EPYE2
http://production.dev.atomcontentmarketing.co.uk/law/finance-
and-strategy/dealing-with-insolvency/subsidised-and-
guaranteed-loans#EPYE3
http://production.dev.atomcontentmarketing.co.uk/law/finance-
and-strategy/dealing-with-insolvency/subsidised-and-
guaranteed-loans#EPYE4
http://production.dev.atomcontentmarketing.co.uk/law/finance-
and-strategy/dealing-with-insolvency/subsidised-and-
guaranteed-loans#EPYE5
http://production.dev.atomcontentmarketing.co.uk/law/finance-
and-strategy/dealing-with-insolvency/subsidised-and-
guaranteed-loans#EPYE6
http://production.dev.atomcontentmarketing.co.uk/law/finance-
and-strategy/dealing-with-insolvency/subsidised-and-
guaranteed-loans#EPYE2
http://production.dev.atomcontentmarketing.co.uk/law/finance-
and-strategy/dealing-with-insolvency/subsidised-and-
guaranteed-loans#EPYE3
their mobile device.
Consider your employees' work-life balance
can encourage employees to
check messages at all hours.
of hours.
people send.
2. Content
Explain the style and tone you expect employees to use in
business emails
telephone conversation and the formality of a letter, although it
may vary
depending on who your staff are contacting.
eople used to
quick, friendly emails.
standards.
be considered rude.
al documents or when approaching
someone for the first time.
Automatically add an email signature to all messages
Specify what content is prohibited
This should include:
other offensive material;
3. Sending emails
Employees should use their own, password-protected accounts
to send emails
ntrolled.
and symbols.
Encourage the use of emails for communications you wish to
keep a record of
Establish standards for outgoing messages
if your company email system can handle large attachments,
your
contacts may not have the same capabilities.
send large files (e.g. those over 10MB) using a
transfer service like Dropbox or Box.
Have rules for handling confidential information
text, so they can be intercepted and read online.
ay want to ban certain types of information from being
sent by email. For example, lists of customers and information
about
new products.
using encrypted email.
Encryption scrambles the message and any attachments so they
cannot be intercepted and read.
Explain the potential contractual significance of emails to
employees
communication.
actually
significant communications, and insist that such documents are
posted.
'This email is confidential, and is intended for the use of the
named recipient
only. If you have received this message in error, please inform
us immediately, and then delete it. Unless it specifically states
otherwise, this email does not form part of a contract.'
messages.
Sending too many emails can lead to information overload
2
http://www.dropbox.com/
https://www.box.com/
to overwork or a tendency to disregard emails. It can also seem
rather
impersonal.
t of email, important
messages may go unnoticed. You can use a 'priority flag' to
highlight
important messages, but it's better to reduce overall email
volume instead.
or speak in person.
ore sending a message to a large number of people, ask
yourself whether they all need to receive it.
Some companies ban it altogether.
or instant messaging for day-to-day internal communications,
rather than
handling everything via email.
Explain your policy on storing both sent and received emails
any later editing or
unauthorised deletion.
example, centrally stored emails are still available even after an
employee
deletes them.
you are monitoring emails.
4. Receiving emails
Set out who should read incoming emails
addresses (eg [email protected]). Assign responsibility for
dealing with such
emails and set up your technology so the relevant people can
read them.
when employees are absent (eg on holiday).
Set out your security procedures for dealing with viruses and
other email threats
viruses and phishing .
Set a response time
- for
instance, customer enquiries - should be replied to, or at least
acknowledged, within 24 hours.
more appropriate.
Explain how emails should be handled when an employee is
absent or leaves
it's simplest to set up an auto-responder which says the
employee has left/is absent and provides an alternative contact.
emails, ensure personal emails are handled appropriately.
Explain how unwelcome emails should be dealt with
inappropriate emails. For instance, inappropriate chain letters or
enquiries
from recruitment consultants.
y to spam as
a response confirms that the email has been sent to a live
address.
Set out your policy on storing incoming emails
Viruses and phishing
Emails can pose a security risk to your business. They are often
used to distribute viruses and spyware, or for phishing attempts.
A central email server or an email service provided by your IT
supplier will include protection to reduce risks. However, even
the
strongest filters will allow the occasional malicious email to
slip through.
Ensure your email policy includes procedures for dealing with
suspicious emails.
Delete attachments from unknown senders
such files from new contacts.
Take care with high-risk file types
e more likely to carry viruses. For
example, file names including .vbs, .js, .exe, .bat, .cmd or .lnk
extensions.
contain such file types.
3
http://www.basecamp.com/
http://www.trello.com/
http://production.dev.atomcontentmarketing.co.uk/law/finance-
and-strategy/dealing-with-insolvency/subsidised-and-
guaranteed-loans#EPYE5
mailto:[email protected]
http://production.dev.atomcontentmarketing.co.uk/law/finance-
and-strategy/dealing-with-insolvency/subsidised-and-
guaranteed-loans#EPYEBox2
Get advice from the IT manager if you are unsure
attachment or if you suspect a virus has entered the system.
Be aware of phishing emails
s aware that criminals increasingly target
individuals in spear phishing attempts, where the email appears
to
come from someone they know.
5. Monitoring email
There are legal restrictions on how you can monitor employees'
use of email.
Include a clause on email monitoring in your employment
contracts. If you fail to do so, you will need to get consent to
perform checks.
Tell employees how email is monitored and for what purposes
aware of this.
Explain that you reserve the right to read individual emails
You may inspect individual emails for 'specific business
purposes', including:
business communications;
are complying with the law and with
your internal policies;
If you wish to make interceptions for other purposes (eg
marketing) you will need consent from the sender and recipient.
Respect your employees' right to privacy
emails, only monitor their emails if they know there is a limit
on personal use
and that their email may be monitored.
the actual content.
message is personal.
6. Implementation
Consult employees on what you should include in your email
policy
Take expert and legal advice
and privacy.
Make the policy available to everyone
fer to the policy in your employment contracts.
of the policy.
questions.
Put in place any software that will help
This might include:
nitoring software to provide a record of email traffic;
-responder software to reply to emails when employees
are absent;
-checking and other security software.
Provide any training that is needed
software.
Enforce the policy
the policy - usually the network administrator. A director
should take
4
overall responsibility.
including management and leadership teams.
place to deal with breaches of the policy.
when necessary.
implemented and enforced.
Signpost
acceptable usage policy from Get Safe Online.
Published by Atom Content Marketing Ltd, CityPoint, Temple
Gate, Bristol, BS1 6PL Tel: 0117 373 6160,
www.atomcontentmarketing.co.uk
5
https://www.getsafeonline.org/rules-guidelines-and-
procedures/staff-policies/
https://www.getsafeonline.org/themes/site_themes/getsafeonline
/download_centre/Sample_Acceptable_Usage_Policy.pdf
http://atomcontentmarketing.co.ukAn email policy for your
employees1. Permitted useEmployees should primarily use
company email systems for businessLimit personal useSet out
when email should and should not be usedSet out what devices
employees may use to send and receive emailMobile devicesIn
general, the same guidelines apply no matter where or how
employees access emailsThe biggest issue with mobile devices
is securityConsider your employees' work-life balance2.
ContentExplain the style and tone you expect employees to use
in business emailsAutomatically add an email signature to all
messagesSpecify what content is prohibited3. Sending
emailsEmployees should use their own, password-protected
accounts to send emailsEncourage the use of emails for
communications you wish to keep a record ofEstablish standards
for outgoing messagesHave rules for handling confidential
informationExplain the potential contractual significance of
emails to employeesSending too many emails can lead to
information overloadExplain your policy on storing both sent
and received emails4. Receiving emailsSet out who should read
incoming emailsSet out your security procedures for dealing
with viruses and other email threatsSet a response timeExplain
how emails should be handled when an employee is absent or
leavesExplain how unwelcome emails should be dealt withSet
out your policy on storing incoming emailsViruses and
phishingDelete attachments from unknown sendersTake care
with high-risk file typesGet advice from the IT manager if you
are unsureBe aware of phishing emails5. Monitoring emailTell
employees how email is monitored and for what
purposesExplain that you reserve the right to read individual
emailsRespect your employees' right to privacy6.
ImplementationConsult employees on what you should include
in your email policyTake expert and legal adviceMake the
policy available to everyonePut in place any software that will
helpProvide any training that is neededEnforce the
policySignpost

More Related Content

Similar to An email policy for your employeesA clear email policy hel.docx

A software engineer designs, develop, tests, and evaluates the sof.docx
A software engineer designs, develop, tests, and evaluates the sof.docxA software engineer designs, develop, tests, and evaluates the sof.docx
A software engineer designs, develop, tests, and evaluates the sof.docxdaniahendric
 
Email Retention Policy1.0 PurposeThe Email Retention Polic.docx
Email Retention Policy1.0 PurposeThe Email Retention Polic.docxEmail Retention Policy1.0 PurposeThe Email Retention Polic.docx
Email Retention Policy1.0 PurposeThe Email Retention Polic.docxchristinemaritza
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentationWan Solo
 
Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Empowerhosting
 
Consensus Policy Resource CommunityEmail PolicyFree Use .docx
Consensus Policy Resource CommunityEmail PolicyFree Use .docxConsensus Policy Resource CommunityEmail PolicyFree Use .docx
Consensus Policy Resource CommunityEmail PolicyFree Use .docxmargaretr5
 
Stay Out of Spam Folder
Stay Out of Spam FolderStay Out of Spam Folder
Stay Out of Spam FolderMyStockAlarm
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquettePradnag
 
Email Communication 1.pptx
Email Communication 1.pptxEmail Communication 1.pptx
Email Communication 1.pptxsafalmulund
 
Internet 8th level imen tek bouaziz 2016
Internet 8th level imen tek bouaziz 2016Internet 8th level imen tek bouaziz 2016
Internet 8th level imen tek bouaziz 2016imen Tekaya Bouaziz
 
Lecture 4 document preparation 1
Lecture 4  document preparation 1Lecture 4  document preparation 1
Lecture 4 document preparation 1MarketingAcademy2
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxPatricia Rountree
 
E mail etiquettes (1)
E mail  etiquettes (1)E mail  etiquettes (1)
E mail etiquettes (1)Imran Ansari
 
CH05.ppt business communications
CH05.ppt business communicationsCH05.ppt business communications
CH05.ppt business communicationsKaren Woltjen Hines
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | SecloreSeclore
 
Glossary of important email marketing terms
Glossary of important email marketing termsGlossary of important email marketing terms
Glossary of important email marketing termsInamDurrani2
 
Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)IJCSIS Research Publications
 

Similar to An email policy for your employeesA clear email policy hel.docx (20)

A software engineer designs, develop, tests, and evaluates the sof.docx
A software engineer designs, develop, tests, and evaluates the sof.docxA software engineer designs, develop, tests, and evaluates the sof.docx
A software engineer designs, develop, tests, and evaluates the sof.docx
 
Email Retention Policy1.0 PurposeThe Email Retention Polic.docx
Email Retention Policy1.0 PurposeThe Email Retention Polic.docxEmail Retention Policy1.0 PurposeThe Email Retention Polic.docx
Email Retention Policy1.0 PurposeThe Email Retention Polic.docx
 
Electrnic mail
Electrnic mailElectrnic mail
Electrnic mail
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
 
Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User. Understanding And Mastering Email Basics: A Guide for Every Email User.
Understanding And Mastering Email Basics: A Guide for Every Email User.
 
Consensus Policy Resource CommunityEmail PolicyFree Use .docx
Consensus Policy Resource CommunityEmail PolicyFree Use .docxConsensus Policy Resource CommunityEmail PolicyFree Use .docx
Consensus Policy Resource CommunityEmail PolicyFree Use .docx
 
Stay Out of Spam Folder
Stay Out of Spam FolderStay Out of Spam Folder
Stay Out of Spam Folder
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
Email Communication 1.pptx
Email Communication 1.pptxEmail Communication 1.pptx
Email Communication 1.pptx
 
Nt1330 Unit 7
Nt1330 Unit 7Nt1330 Unit 7
Nt1330 Unit 7
 
Documenting Email as Part of the Client File
Documenting Email as Part of the Client FileDocumenting Email as Part of the Client File
Documenting Email as Part of the Client File
 
Internet 8th level imen tek bouaziz 2016
Internet 8th level imen tek bouaziz 2016Internet 8th level imen tek bouaziz 2016
Internet 8th level imen tek bouaziz 2016
 
Lecture 4 document preparation 1
Lecture 4  document preparation 1Lecture 4  document preparation 1
Lecture 4 document preparation 1
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docx
 
E mail etiquettes (1)
E mail  etiquettes (1)E mail  etiquettes (1)
E mail etiquettes (1)
 
CH05.ppt business communications
CH05.ppt business communicationsCH05.ppt business communications
CH05.ppt business communications
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | Seclore
 
Glossary of important email marketing terms
Glossary of important email marketing termsGlossary of important email marketing terms
Glossary of important email marketing terms
 
Good e mail practices
Good e mail practicesGood e mail practices
Good e mail practices
 
Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)Electronic Mail Security (University of Jeddah, Saudi Arabia)
Electronic Mail Security (University of Jeddah, Saudi Arabia)
 

More from greg1eden90113

Analyze and describe how social media could influence each stage of .docx
Analyze and describe how social media could influence each stage of .docxAnalyze and describe how social media could influence each stage of .docx
Analyze and describe how social media could influence each stage of .docxgreg1eden90113
 
Analyze Delta Airlines, Inc public stock exchange NYSE- company’s pr.docx
Analyze Delta Airlines, Inc public stock exchange NYSE- company’s pr.docxAnalyze Delta Airlines, Inc public stock exchange NYSE- company’s pr.docx
Analyze Delta Airlines, Inc public stock exchange NYSE- company’s pr.docxgreg1eden90113
 
Analyze and Evaluate Human Performance TechnologyNow that you ha.docx
Analyze and Evaluate Human Performance TechnologyNow that you ha.docxAnalyze and Evaluate Human Performance TechnologyNow that you ha.docx
Analyze and Evaluate Human Performance TechnologyNow that you ha.docxgreg1eden90113
 
Analyze a popular culture reference (e.g., song, tv show, movie) o.docx
Analyze a popular culture reference (e.g., song, tv show, movie) o.docxAnalyze a popular culture reference (e.g., song, tv show, movie) o.docx
Analyze a popular culture reference (e.g., song, tv show, movie) o.docxgreg1eden90113
 
ANALYTICS PLAN TO REDUCE CUSTOMER CHURN AT YORE BLENDS Himabin.docx
ANALYTICS PLAN TO REDUCE CUSTOMER CHURN AT YORE BLENDS Himabin.docxANALYTICS PLAN TO REDUCE CUSTOMER CHURN AT YORE BLENDS Himabin.docx
ANALYTICS PLAN TO REDUCE CUSTOMER CHURN AT YORE BLENDS Himabin.docxgreg1eden90113
 
Analytics, Data Science, and Artificial Intelligence, 11th Editi.docx
Analytics, Data Science, and Artificial Intelligence, 11th Editi.docxAnalytics, Data Science, and Artificial Intelligence, 11th Editi.docx
Analytics, Data Science, and Artificial Intelligence, 11th Editi.docxgreg1eden90113
 
Analytical Essay One, due Sunday, February 24th at 1100 pmTopic.docx
Analytical Essay One, due Sunday, February 24th at 1100 pmTopic.docxAnalytical Essay One, due Sunday, February 24th at 1100 pmTopic.docx
Analytical Essay One, due Sunday, February 24th at 1100 pmTopic.docxgreg1eden90113
 
Analytical Essay Two, due Sunday, March 31st at 1100 pmTopi.docx
Analytical Essay Two, due Sunday, March 31st at 1100 pmTopi.docxAnalytical Essay Two, due Sunday, March 31st at 1100 pmTopi.docx
Analytical Essay Two, due Sunday, March 31st at 1100 pmTopi.docxgreg1eden90113
 
analytic 1000 word essay about the Matrix 1  Simple english .docx
analytic 1000 word essay about the Matrix 1  Simple english .docxanalytic 1000 word essay about the Matrix 1  Simple english .docx
analytic 1000 word essay about the Matrix 1  Simple english .docxgreg1eden90113
 
ANALYSIS PAPER GUIDELINES and FORMAT What is the problem or is.docx
ANALYSIS PAPER GUIDELINES and FORMAT What is the problem or is.docxANALYSIS PAPER GUIDELINES and FORMAT What is the problem or is.docx
ANALYSIS PAPER GUIDELINES and FORMAT What is the problem or is.docxgreg1eden90113
 
Analysis on the Demand of Top Talent Introduction in Big Dat.docx
Analysis on the Demand of Top Talent Introduction in Big Dat.docxAnalysis on the Demand of Top Talent Introduction in Big Dat.docx
Analysis on the Demand of Top Talent Introduction in Big Dat.docxgreg1eden90113
 
AnalysisLet s embrace ourdual identitiesCOMMUNITY COHE.docx
AnalysisLet s embrace ourdual identitiesCOMMUNITY COHE.docxAnalysisLet s embrace ourdual identitiesCOMMUNITY COHE.docx
AnalysisLet s embrace ourdual identitiesCOMMUNITY COHE.docxgreg1eden90113
 
Analysis of the Marketing outlook of Ferrari4MARK001W Mark.docx
Analysis of the Marketing outlook of Ferrari4MARK001W Mark.docxAnalysis of the Marketing outlook of Ferrari4MARK001W Mark.docx
Analysis of the Marketing outlook of Ferrari4MARK001W Mark.docxgreg1eden90113
 
Analysis of the Monetary Systems and International Finance with .docx
Analysis of the Monetary Systems and International Finance with .docxAnalysis of the Monetary Systems and International Finance with .docx
Analysis of the Monetary Systems and International Finance with .docxgreg1eden90113
 
Analysis of the Barrios Gomez, Agustin, et al. Mexico-US A New .docx
Analysis of the Barrios Gomez, Agustin, et al. Mexico-US A New .docxAnalysis of the Barrios Gomez, Agustin, et al. Mexico-US A New .docx
Analysis of the Barrios Gomez, Agustin, et al. Mexico-US A New .docxgreg1eden90113
 
Analysis of Literature ReviewFailure to develop key competencie.docx
Analysis of Literature ReviewFailure to develop key competencie.docxAnalysis of Literature ReviewFailure to develop key competencie.docx
Analysis of Literature ReviewFailure to develop key competencie.docxgreg1eden90113
 
Analysis Of Electronic Health Records System1C.docx
Analysis Of Electronic Health Records System1C.docxAnalysis Of Electronic Health Records System1C.docx
Analysis Of Electronic Health Records System1C.docxgreg1eden90113
 
Analysis of element, when we perform this skill we break up a whole .docx
Analysis of element, when we perform this skill we break up a whole .docxAnalysis of element, when we perform this skill we break up a whole .docx
Analysis of element, when we perform this skill we break up a whole .docxgreg1eden90113
 
Analysis of a Career in SurgeryStude.docx
Analysis of a Career in SurgeryStude.docxAnalysis of a Career in SurgeryStude.docx
Analysis of a Career in SurgeryStude.docxgreg1eden90113
 
Analysis Assignment -Major Artist ResearchInstructionsYo.docx
Analysis Assignment -Major Artist ResearchInstructionsYo.docxAnalysis Assignment -Major Artist ResearchInstructionsYo.docx
Analysis Assignment -Major Artist ResearchInstructionsYo.docxgreg1eden90113
 

More from greg1eden90113 (20)

Analyze and describe how social media could influence each stage of .docx
Analyze and describe how social media could influence each stage of .docxAnalyze and describe how social media could influence each stage of .docx
Analyze and describe how social media could influence each stage of .docx
 
Analyze Delta Airlines, Inc public stock exchange NYSE- company’s pr.docx
Analyze Delta Airlines, Inc public stock exchange NYSE- company’s pr.docxAnalyze Delta Airlines, Inc public stock exchange NYSE- company’s pr.docx
Analyze Delta Airlines, Inc public stock exchange NYSE- company’s pr.docx
 
Analyze and Evaluate Human Performance TechnologyNow that you ha.docx
Analyze and Evaluate Human Performance TechnologyNow that you ha.docxAnalyze and Evaluate Human Performance TechnologyNow that you ha.docx
Analyze and Evaluate Human Performance TechnologyNow that you ha.docx
 
Analyze a popular culture reference (e.g., song, tv show, movie) o.docx
Analyze a popular culture reference (e.g., song, tv show, movie) o.docxAnalyze a popular culture reference (e.g., song, tv show, movie) o.docx
Analyze a popular culture reference (e.g., song, tv show, movie) o.docx
 
ANALYTICS PLAN TO REDUCE CUSTOMER CHURN AT YORE BLENDS Himabin.docx
ANALYTICS PLAN TO REDUCE CUSTOMER CHURN AT YORE BLENDS Himabin.docxANALYTICS PLAN TO REDUCE CUSTOMER CHURN AT YORE BLENDS Himabin.docx
ANALYTICS PLAN TO REDUCE CUSTOMER CHURN AT YORE BLENDS Himabin.docx
 
Analytics, Data Science, and Artificial Intelligence, 11th Editi.docx
Analytics, Data Science, and Artificial Intelligence, 11th Editi.docxAnalytics, Data Science, and Artificial Intelligence, 11th Editi.docx
Analytics, Data Science, and Artificial Intelligence, 11th Editi.docx
 
Analytical Essay One, due Sunday, February 24th at 1100 pmTopic.docx
Analytical Essay One, due Sunday, February 24th at 1100 pmTopic.docxAnalytical Essay One, due Sunday, February 24th at 1100 pmTopic.docx
Analytical Essay One, due Sunday, February 24th at 1100 pmTopic.docx
 
Analytical Essay Two, due Sunday, March 31st at 1100 pmTopi.docx
Analytical Essay Two, due Sunday, March 31st at 1100 pmTopi.docxAnalytical Essay Two, due Sunday, March 31st at 1100 pmTopi.docx
Analytical Essay Two, due Sunday, March 31st at 1100 pmTopi.docx
 
analytic 1000 word essay about the Matrix 1  Simple english .docx
analytic 1000 word essay about the Matrix 1  Simple english .docxanalytic 1000 word essay about the Matrix 1  Simple english .docx
analytic 1000 word essay about the Matrix 1  Simple english .docx
 
ANALYSIS PAPER GUIDELINES and FORMAT What is the problem or is.docx
ANALYSIS PAPER GUIDELINES and FORMAT What is the problem or is.docxANALYSIS PAPER GUIDELINES and FORMAT What is the problem or is.docx
ANALYSIS PAPER GUIDELINES and FORMAT What is the problem or is.docx
 
Analysis on the Demand of Top Talent Introduction in Big Dat.docx
Analysis on the Demand of Top Talent Introduction in Big Dat.docxAnalysis on the Demand of Top Talent Introduction in Big Dat.docx
Analysis on the Demand of Top Talent Introduction in Big Dat.docx
 
AnalysisLet s embrace ourdual identitiesCOMMUNITY COHE.docx
AnalysisLet s embrace ourdual identitiesCOMMUNITY COHE.docxAnalysisLet s embrace ourdual identitiesCOMMUNITY COHE.docx
AnalysisLet s embrace ourdual identitiesCOMMUNITY COHE.docx
 
Analysis of the Marketing outlook of Ferrari4MARK001W Mark.docx
Analysis of the Marketing outlook of Ferrari4MARK001W Mark.docxAnalysis of the Marketing outlook of Ferrari4MARK001W Mark.docx
Analysis of the Marketing outlook of Ferrari4MARK001W Mark.docx
 
Analysis of the Monetary Systems and International Finance with .docx
Analysis of the Monetary Systems and International Finance with .docxAnalysis of the Monetary Systems and International Finance with .docx
Analysis of the Monetary Systems and International Finance with .docx
 
Analysis of the Barrios Gomez, Agustin, et al. Mexico-US A New .docx
Analysis of the Barrios Gomez, Agustin, et al. Mexico-US A New .docxAnalysis of the Barrios Gomez, Agustin, et al. Mexico-US A New .docx
Analysis of the Barrios Gomez, Agustin, et al. Mexico-US A New .docx
 
Analysis of Literature ReviewFailure to develop key competencie.docx
Analysis of Literature ReviewFailure to develop key competencie.docxAnalysis of Literature ReviewFailure to develop key competencie.docx
Analysis of Literature ReviewFailure to develop key competencie.docx
 
Analysis Of Electronic Health Records System1C.docx
Analysis Of Electronic Health Records System1C.docxAnalysis Of Electronic Health Records System1C.docx
Analysis Of Electronic Health Records System1C.docx
 
Analysis of element, when we perform this skill we break up a whole .docx
Analysis of element, when we perform this skill we break up a whole .docxAnalysis of element, when we perform this skill we break up a whole .docx
Analysis of element, when we perform this skill we break up a whole .docx
 
Analysis of a Career in SurgeryStude.docx
Analysis of a Career in SurgeryStude.docxAnalysis of a Career in SurgeryStude.docx
Analysis of a Career in SurgeryStude.docx
 
Analysis Assignment -Major Artist ResearchInstructionsYo.docx
Analysis Assignment -Major Artist ResearchInstructionsYo.docxAnalysis Assignment -Major Artist ResearchInstructionsYo.docx
Analysis Assignment -Major Artist ResearchInstructionsYo.docx
 

Recently uploaded

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

An email policy for your employeesA clear email policy hel.docx

  • 1. An email policy for your employees A clear email policy helps prevent timewasting, protects data security and minimises the risk of legal problems. As well as setting out how employees can use email, the policy should cover any email monitoring you intend to carry out. Permitted use Content Sending emails Receiving emails Monitoring email Implementation 1. Permitted use Employees should primarily use company email systems for business It is pragmatic to allow some personal use of email, especially if you have employees who use their email for business purposes outside of normal working hours.
  • 2. messages into specific business and personal folders. Limit personal use You might prohibit: allowing other people to access their email account. For example, harassing someone by email might be a clear violation of your email policy. Set out when email should and should not be used Set out what devices employees may use to send and receive email company email account? Mobile devices It is common for employees to send and receive emails from mobile devices, like smart phones and tablets. In general, the same guidelines apply no matter where or how employees access emails on personal use of email if they stay in touch via their mobile
  • 3. device outside of office hours. The biggest issue with mobile devices is security before emails can be viewed. remotely if a device is lost or stolen. across all devices. This ensures employees can always access emails, even if they lose 1 http://production.dev.atomcontentmarketing.co.uk/law/finance- and-strategy/dealing-with-insolvency/subsidised-and- guaranteed-loans#EPYE1 http://production.dev.atomcontentmarketing.co.uk/law/finance- and-strategy/dealing-with-insolvency/subsidised-and- guaranteed-loans#EPYE2 http://production.dev.atomcontentmarketing.co.uk/law/finance- and-strategy/dealing-with-insolvency/subsidised-and- guaranteed-loans#EPYE3 http://production.dev.atomcontentmarketing.co.uk/law/finance- and-strategy/dealing-with-insolvency/subsidised-and- guaranteed-loans#EPYE4 http://production.dev.atomcontentmarketing.co.uk/law/finance- and-strategy/dealing-with-insolvency/subsidised-and- guaranteed-loans#EPYE5 http://production.dev.atomcontentmarketing.co.uk/law/finance- and-strategy/dealing-with-insolvency/subsidised-and- guaranteed-loans#EPYE6 http://production.dev.atomcontentmarketing.co.uk/law/finance- and-strategy/dealing-with-insolvency/subsidised-and- guaranteed-loans#EPYE2 http://production.dev.atomcontentmarketing.co.uk/law/finance-
  • 4. and-strategy/dealing-with-insolvency/subsidised-and- guaranteed-loans#EPYE3 their mobile device. Consider your employees' work-life balance can encourage employees to check messages at all hours. of hours. people send. 2. Content Explain the style and tone you expect employees to use in business emails telephone conversation and the formality of a letter, although it may vary depending on who your staff are contacting. eople used to quick, friendly emails. standards. be considered rude. al documents or when approaching someone for the first time. Automatically add an email signature to all messages
  • 5. Specify what content is prohibited This should include: other offensive material; 3. Sending emails Employees should use their own, password-protected accounts to send emails ntrolled. and symbols. Encourage the use of emails for communications you wish to keep a record of Establish standards for outgoing messages if your company email system can handle large attachments, your contacts may not have the same capabilities. send large files (e.g. those over 10MB) using a transfer service like Dropbox or Box.
  • 6. Have rules for handling confidential information text, so they can be intercepted and read online. ay want to ban certain types of information from being sent by email. For example, lists of customers and information about new products. using encrypted email. Encryption scrambles the message and any attachments so they cannot be intercepted and read. Explain the potential contractual significance of emails to employees communication. actually significant communications, and insist that such documents are posted. 'This email is confidential, and is intended for the use of the named recipient only. If you have received this message in error, please inform us immediately, and then delete it. Unless it specifically states otherwise, this email does not form part of a contract.' messages. Sending too many emails can lead to information overload
  • 7. 2 http://www.dropbox.com/ https://www.box.com/ to overwork or a tendency to disregard emails. It can also seem rather impersonal. t of email, important messages may go unnoticed. You can use a 'priority flag' to highlight important messages, but it's better to reduce overall email volume instead. or speak in person. ore sending a message to a large number of people, ask yourself whether they all need to receive it. Some companies ban it altogether. or instant messaging for day-to-day internal communications, rather than handling everything via email. Explain your policy on storing both sent and received emails any later editing or unauthorised deletion.
  • 8. example, centrally stored emails are still available even after an employee deletes them. you are monitoring emails. 4. Receiving emails Set out who should read incoming emails addresses (eg [email protected]). Assign responsibility for dealing with such emails and set up your technology so the relevant people can read them. when employees are absent (eg on holiday). Set out your security procedures for dealing with viruses and other email threats viruses and phishing . Set a response time - for instance, customer enquiries - should be replied to, or at least acknowledged, within 24 hours. more appropriate.
  • 9. Explain how emails should be handled when an employee is absent or leaves it's simplest to set up an auto-responder which says the employee has left/is absent and provides an alternative contact. emails, ensure personal emails are handled appropriately. Explain how unwelcome emails should be dealt with inappropriate emails. For instance, inappropriate chain letters or enquiries from recruitment consultants. y to spam as a response confirms that the email has been sent to a live address. Set out your policy on storing incoming emails Viruses and phishing Emails can pose a security risk to your business. They are often used to distribute viruses and spyware, or for phishing attempts. A central email server or an email service provided by your IT supplier will include protection to reduce risks. However, even the strongest filters will allow the occasional malicious email to slip through. Ensure your email policy includes procedures for dealing with suspicious emails. Delete attachments from unknown senders
  • 10. such files from new contacts. Take care with high-risk file types e more likely to carry viruses. For example, file names including .vbs, .js, .exe, .bat, .cmd or .lnk extensions. contain such file types. 3 http://www.basecamp.com/ http://www.trello.com/ http://production.dev.atomcontentmarketing.co.uk/law/finance- and-strategy/dealing-with-insolvency/subsidised-and- guaranteed-loans#EPYE5 mailto:[email protected] http://production.dev.atomcontentmarketing.co.uk/law/finance- and-strategy/dealing-with-insolvency/subsidised-and- guaranteed-loans#EPYEBox2 Get advice from the IT manager if you are unsure attachment or if you suspect a virus has entered the system. Be aware of phishing emails s aware that criminals increasingly target individuals in spear phishing attempts, where the email appears to come from someone they know.
  • 11. 5. Monitoring email There are legal restrictions on how you can monitor employees' use of email. Include a clause on email monitoring in your employment contracts. If you fail to do so, you will need to get consent to perform checks. Tell employees how email is monitored and for what purposes aware of this. Explain that you reserve the right to read individual emails You may inspect individual emails for 'specific business purposes', including: business communications; are complying with the law and with your internal policies; If you wish to make interceptions for other purposes (eg marketing) you will need consent from the sender and recipient. Respect your employees' right to privacy emails, only monitor their emails if they know there is a limit on personal use
  • 12. and that their email may be monitored. the actual content. message is personal. 6. Implementation Consult employees on what you should include in your email policy Take expert and legal advice and privacy. Make the policy available to everyone fer to the policy in your employment contracts. of the policy. questions. Put in place any software that will help This might include: nitoring software to provide a record of email traffic; -responder software to reply to emails when employees are absent; -checking and other security software.
  • 13. Provide any training that is needed software. Enforce the policy the policy - usually the network administrator. A director should take 4 overall responsibility. including management and leadership teams. place to deal with breaches of the policy. when necessary. implemented and enforced. Signpost acceptable usage policy from Get Safe Online. Published by Atom Content Marketing Ltd, CityPoint, Temple Gate, Bristol, BS1 6PL Tel: 0117 373 6160, www.atomcontentmarketing.co.uk 5
  • 14. https://www.getsafeonline.org/rules-guidelines-and- procedures/staff-policies/ https://www.getsafeonline.org/themes/site_themes/getsafeonline /download_centre/Sample_Acceptable_Usage_Policy.pdf http://atomcontentmarketing.co.ukAn email policy for your employees1. Permitted useEmployees should primarily use company email systems for businessLimit personal useSet out when email should and should not be usedSet out what devices employees may use to send and receive emailMobile devicesIn general, the same guidelines apply no matter where or how employees access emailsThe biggest issue with mobile devices is securityConsider your employees' work-life balance2. ContentExplain the style and tone you expect employees to use in business emailsAutomatically add an email signature to all messagesSpecify what content is prohibited3. Sending emailsEmployees should use their own, password-protected accounts to send emailsEncourage the use of emails for communications you wish to keep a record ofEstablish standards for outgoing messagesHave rules for handling confidential informationExplain the potential contractual significance of emails to employeesSending too many emails can lead to information overloadExplain your policy on storing both sent and received emails4. Receiving emailsSet out who should read incoming emailsSet out your security procedures for dealing with viruses and other email threatsSet a response timeExplain how emails should be handled when an employee is absent or leavesExplain how unwelcome emails should be dealt withSet out your policy on storing incoming emailsViruses and phishingDelete attachments from unknown sendersTake care with high-risk file typesGet advice from the IT manager if you are unsureBe aware of phishing emails5. Monitoring emailTell employees how email is monitored and for what purposesExplain that you reserve the right to read individual emailsRespect your employees' right to privacy6. ImplementationConsult employees on what you should include in your email policyTake expert and legal adviceMake the
  • 15. policy available to everyonePut in place any software that will helpProvide any training that is neededEnforce the policySignpost