SlideShare a Scribd company logo
Memorandum: POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Policies to Be Adhered
Equipment and Fair internet usage Policy.
 Company employees are expected to use the Internet responsibly and productively. Internet access is limited to
work-related activities ONLY and personal use is not permitted.
 Job-related activities include research/client work/communication, business requirements and tasks that are
accomplished through fair means of using internet.
 The equipment provided to employees such as Laptops/Flash Drives/Headgears/USB
mouse/Keyboards/Chargers ETC. are at all times company property and should be dealt with caution.
 NO company property such as Laptops/screens/mouse/headgears Android devices etc. should be taken with an
employee without a proper approval from an authorized personnel for any personal use.
(Contact the network admin.)
 Any employee looking to take any company equipment home to work, should fill out a request form which can
be obtained through your network admin.(Subject To Approval).
 Any employee found guilty of miss-using the above mentioned equipment, may result in company establishing a
disciplinary action against the employee including (Covering costs of the IT Equipment & a written
warning).
 Internet browsing and data accessed, is being monitored and any employee spotted of doing non-work related
activities will be dealt strictly, with consequences bearing up to dismissal or vice/versa.
 Any employee found using Emails/Skype/social networking sites etc. containing offensive or abusive material
will be strictly dealt with.
 Laptop/Desktop should be clear of any sort of games. No games should be installed on any work related station.
 All sites and downloads are monitored and can be blocked by the company if they are deemed harmful and not
productive to business.
 The installation of random, non-work-related softwares will be deleted and should not be installed as they are
BARRED.
 Any employee’s system can be accessed remotely to see everything is in accordance and a spot check on any
employee can be conducted to ensure compliance in accordance to the company’s INTERNET &
TECHNOLOGY USE POLICY.
 A daily data traffic report of Internet (it will contain each and everything about which sites and which data was
downloaded) will be generated and will be monitored to ensure compliance and any employee found in breach of
this policy will be strictly dealt with.
 Any employee found using company property to perpetrate any form of fraud, or disclosing someone else's
password without authorization will be immediately TERMINATED.
 Any employee found hacking, sending or posting information that is defamatory to the company, its
products/services, colleagues and/or Clients will be dealt accordingly.
 Any employee found guilty of introducing/installing/distributing malicious software on the company network
and/or jeopardizing the security of the organization's electronic communications systems will face serious
consequences.
 At any point, no employee should remove any technical equipment by him/herself, an authorized personal such
as a Network Admin should be consulted immediately.
 Any employee unsure about constituted Internet usage & policy should immediately consult Network
Administrator Manager or Human Resources for further guidance and clarification.
Standard Operating Procedures
 Browser History /Cache should be cleared periodically (Weekly/Monthly) ADVISABLE.
 All FTP Uploads/Downloads should be intimated to the Network Admin in advance, as sometimes multiple
FTP downloads affect the speed of the internet.
 Work stations should be shut down properly at the shift end and the laptop chargers should be unplugged to
ensure compliance and smooth running of the equipment.
 Non-Work related applications should not be installed as they are considered a breach of company’s IT
Policy.
 DON’T save any of your Important Data on your Desktop: because if window is corrupt, the data saved on
the desktop cannot be recovered
 DO NOT mention any credit /links/clients/Projects/ work related details etc. on your personal portfolio,
that you have worked upon as an iPlex Pvt. Ltd. employee, this is strictly FORBIDDEN and the work
completed at iPlex Pvt. Ltd. is solely company property not to be DISCLOSED.
 The above SOP maybe periodically changed and implemented.
User compliance
I understand and will abide by this. I further understand that should I commit any violation of this policy,
my access privileges may be revoked, disciplinary action and/or appropriate legal action may be taken in
accordance.
_________________ ______________
Employee signature Date

More Related Content

What's hot

Laptop Acknowledgement Form
Laptop Acknowledgement FormLaptop Acknowledgement Form
Laptop Acknowledgement FormJay Newman
 
Letter for opening a bank account
Letter for opening a bank accountLetter for opening a bank account
Letter for opening a bank accountRajat Sharma
 
Sample company bond agreement
Sample company bond agreement Sample company bond agreement
Sample company bond agreement
Thesis Scientist Private Limited
 
Contract of-employment probationary employee
Contract of-employment probationary employeeContract of-employment probationary employee
Contract of-employment probationary employeejames_han
 
Probationary Employment Contract Sample
Probationary Employment Contract SampleProbationary Employment Contract Sample
Probationary Employment Contract SampleHarve Abella
 
Pec registration
Pec registrationPec registration
Pec registration
NaveedShazad1
 
GFR 2017
GFR 2017GFR 2017
Note sheet
Note sheetNote sheet
Note sheet
hosting guests
 
2. WAPDA Conduct Rules 1978.doc
2. WAPDA Conduct Rules 1978.doc2. WAPDA Conduct Rules 1978.doc
2. WAPDA Conduct Rules 1978.doc
Ali Asad Sahu
 
VOEverificationAdapter
VOEverificationAdapterVOEverificationAdapter
VOEverificationAdapterFahad Algarni
 

What's hot (10)

Laptop Acknowledgement Form
Laptop Acknowledgement FormLaptop Acknowledgement Form
Laptop Acknowledgement Form
 
Letter for opening a bank account
Letter for opening a bank accountLetter for opening a bank account
Letter for opening a bank account
 
Sample company bond agreement
Sample company bond agreement Sample company bond agreement
Sample company bond agreement
 
Contract of-employment probationary employee
Contract of-employment probationary employeeContract of-employment probationary employee
Contract of-employment probationary employee
 
Probationary Employment Contract Sample
Probationary Employment Contract SampleProbationary Employment Contract Sample
Probationary Employment Contract Sample
 
Pec registration
Pec registrationPec registration
Pec registration
 
GFR 2017
GFR 2017GFR 2017
GFR 2017
 
Note sheet
Note sheetNote sheet
Note sheet
 
2. WAPDA Conduct Rules 1978.doc
2. WAPDA Conduct Rules 1978.doc2. WAPDA Conduct Rules 1978.doc
2. WAPDA Conduct Rules 1978.doc
 
VOEverificationAdapter
VOEverificationAdapterVOEverificationAdapter
VOEverificationAdapter
 

Viewers also liked

policies and prosedures For JK Air Finished
policies and prosedures For JK Air Finishedpolicies and prosedures For JK Air Finished
policies and prosedures For JK Air FinishedLevi Williams
 
Google’s Internal Memo Leaked "JavaScript is Flawed, Won't Work, and Can't Be...
Google’s Internal Memo Leaked "JavaScript is Flawed, Won't Work, and Can't Be...Google’s Internal Memo Leaked "JavaScript is Flawed, Won't Work, and Can't Be...
Google’s Internal Memo Leaked "JavaScript is Flawed, Won't Work, and Can't Be...
Stephane Beladaci
 
Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles
Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles

Dobusch Leonhard
 
Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use
Sue Barrett
 
Employees and Internet Use - Legal Aspects
Employees and Internet Use - Legal Aspects Employees and Internet Use - Legal Aspects
Employees and Internet Use - Legal Aspects
Darius Whelan
 
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Darius Whelan
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
gfair3
 

Viewers also liked (9)

policies and prosedures For JK Air Finished
policies and prosedures For JK Air Finishedpolicies and prosedures For JK Air Finished
policies and prosedures For JK Air Finished
 
Google’s Internal Memo Leaked "JavaScript is Flawed, Won't Work, and Can't Be...
Google’s Internal Memo Leaked "JavaScript is Flawed, Won't Work, and Can't Be...Google’s Internal Memo Leaked "JavaScript is Flawed, Won't Work, and Can't Be...
Google’s Internal Memo Leaked "JavaScript is Flawed, Won't Work, and Can't Be...
 
Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles
Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles

 
Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use
 
Employees and Internet Use - Legal Aspects
Employees and Internet Use - Legal Aspects Employees and Internet Use - Legal Aspects
Employees and Internet Use - Legal Aspects
 
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Tb writing book
Tb writing bookTb writing book
Tb writing book
 
Memorandos
MemorandosMemorandos
Memorandos
 

Similar to Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE

IT Policy
IT Policy IT Policy
IT Policy
Julian Hutabarat
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
Wissam Abdel Baki
 
Checklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersChecklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workers
Peter Hagen
 
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNPOLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
Luis Antonio Bustillos López
 
Level 3 lsr tech solutions employee access iphone and ipad
Level 3 lsr tech solutions employee access iphone and ipadLevel 3 lsr tech solutions employee access iphone and ipad
Level 3 lsr tech solutions employee access iphone and ipadjoeblow1234
 
The Realities of Implementing a Remote Workforce
The Realities of Implementing a Remote WorkforceThe Realities of Implementing a Remote Workforce
The Realities of Implementing a Remote Workforce
Richard Hatheway
 
Consensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicConsensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access Polic
AlleneMcclendon878
 
Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access polic
ARIV4
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)scobycakau
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
Demand Metric
 
Schooley mitchell mobile device policy white paper 2016
Schooley mitchell mobile device policy white paper 2016Schooley mitchell mobile device policy white paper 2016
Schooley mitchell mobile device policy white paper 2016
Jerry Pollio
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Vijay Dalmia
 
Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docx
Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docxRunning head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docx
Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docx
jeanettehully
 
code of conduct
code of conductcode of conduct
code of conduct
David Waddell
 
It policy (ver 1.0)
It policy (ver  1.0)It policy (ver  1.0)
It policy (ver 1.0)
sentmery5
 
ISSP on Fair Use of Organizational Technology for CGT
ISSP on Fair Use of Organizational Technology for CGTISSP on Fair Use of Organizational Technology for CGT
ISSP on Fair Use of Organizational Technology for CGT
cheyennedaisy
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)
Matthew Charles
 
User responsibilities policy
User responsibilities policyUser responsibilities policy
User responsibilities policyJigyanshu Jangid
 

Similar to Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE (20)

IT Policy
IT Policy IT Policy
IT Policy
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
 
Checklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersChecklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workers
 
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNPOLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
 
Level 3 lsr tech solutions employee access iphone and ipad
Level 3 lsr tech solutions employee access iphone and ipadLevel 3 lsr tech solutions employee access iphone and ipad
Level 3 lsr tech solutions employee access iphone and ipad
 
The Realities of Implementing a Remote Workforce
The Realities of Implementing a Remote WorkforceThe Realities of Implementing a Remote Workforce
The Realities of Implementing a Remote Workforce
 
Consensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicConsensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access Polic
 
Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access polic
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
Schooley mitchell mobile device policy white paper 2016
Schooley mitchell mobile device policy white paper 2016Schooley mitchell mobile device policy white paper 2016
Schooley mitchell mobile device policy white paper 2016
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT network
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
 
Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docx
Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docxRunning head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docx
Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docx
 
code of conduct
code of conductcode of conduct
code of conduct
 
It policy (ver 1.0)
It policy (ver  1.0)It policy (ver  1.0)
It policy (ver 1.0)
 
ISSP on Fair Use of Organizational Technology for CGT
ISSP on Fair Use of Organizational Technology for CGTISSP on Fair Use of Organizational Technology for CGT
ISSP on Fair Use of Organizational Technology for CGT
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)
 
Computer Basics in the Work Place
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
 
User responsibilities policy
User responsibilities policyUser responsibilities policy
User responsibilities policy
 

Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE

  • 1. Memorandum: POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE Policies to Be Adhered Equipment and Fair internet usage Policy.  Company employees are expected to use the Internet responsibly and productively. Internet access is limited to work-related activities ONLY and personal use is not permitted.  Job-related activities include research/client work/communication, business requirements and tasks that are accomplished through fair means of using internet.  The equipment provided to employees such as Laptops/Flash Drives/Headgears/USB mouse/Keyboards/Chargers ETC. are at all times company property and should be dealt with caution.  NO company property such as Laptops/screens/mouse/headgears Android devices etc. should be taken with an employee without a proper approval from an authorized personnel for any personal use. (Contact the network admin.)  Any employee looking to take any company equipment home to work, should fill out a request form which can be obtained through your network admin.(Subject To Approval).  Any employee found guilty of miss-using the above mentioned equipment, may result in company establishing a disciplinary action against the employee including (Covering costs of the IT Equipment & a written warning).  Internet browsing and data accessed, is being monitored and any employee spotted of doing non-work related activities will be dealt strictly, with consequences bearing up to dismissal or vice/versa.  Any employee found using Emails/Skype/social networking sites etc. containing offensive or abusive material will be strictly dealt with.  Laptop/Desktop should be clear of any sort of games. No games should be installed on any work related station.  All sites and downloads are monitored and can be blocked by the company if they are deemed harmful and not productive to business.  The installation of random, non-work-related softwares will be deleted and should not be installed as they are BARRED.  Any employee’s system can be accessed remotely to see everything is in accordance and a spot check on any employee can be conducted to ensure compliance in accordance to the company’s INTERNET & TECHNOLOGY USE POLICY.  A daily data traffic report of Internet (it will contain each and everything about which sites and which data was downloaded) will be generated and will be monitored to ensure compliance and any employee found in breach of this policy will be strictly dealt with.  Any employee found using company property to perpetrate any form of fraud, or disclosing someone else's password without authorization will be immediately TERMINATED.
  • 2.  Any employee found hacking, sending or posting information that is defamatory to the company, its products/services, colleagues and/or Clients will be dealt accordingly.  Any employee found guilty of introducing/installing/distributing malicious software on the company network and/or jeopardizing the security of the organization's electronic communications systems will face serious consequences.  At any point, no employee should remove any technical equipment by him/herself, an authorized personal such as a Network Admin should be consulted immediately.  Any employee unsure about constituted Internet usage & policy should immediately consult Network Administrator Manager or Human Resources for further guidance and clarification. Standard Operating Procedures  Browser History /Cache should be cleared periodically (Weekly/Monthly) ADVISABLE.  All FTP Uploads/Downloads should be intimated to the Network Admin in advance, as sometimes multiple FTP downloads affect the speed of the internet.  Work stations should be shut down properly at the shift end and the laptop chargers should be unplugged to ensure compliance and smooth running of the equipment.  Non-Work related applications should not be installed as they are considered a breach of company’s IT Policy.  DON’T save any of your Important Data on your Desktop: because if window is corrupt, the data saved on the desktop cannot be recovered  DO NOT mention any credit /links/clients/Projects/ work related details etc. on your personal portfolio, that you have worked upon as an iPlex Pvt. Ltd. employee, this is strictly FORBIDDEN and the work completed at iPlex Pvt. Ltd. is solely company property not to be DISCLOSED.  The above SOP maybe periodically changed and implemented. User compliance I understand and will abide by this. I further understand that should I commit any violation of this policy, my access privileges may be revoked, disciplinary action and/or appropriate legal action may be taken in accordance. _________________ ______________ Employee signature Date