SlideShare a Scribd company logo
1 of 12
M3 ASSIGNMENT 2
M3 Assignment 2
Iram Bautista
B6120: Communication Strategies for Managers
Argosy University
Professor James Pasch
August 11, 2018
Communication Policy on Use of Emails and Internet at Zabco
Company
This communication policy is aimed at providing guidance on
how the employees within Zabco Company are to use the
internet and emails. The assumption is that limited personal use
of internet and email is not limited.
1.0 Introduction
The internet and email facilities are provided within the
company to ensure that they are used for purposes that benefit
the company. All staff members are expected to follow and
adhere to the rules set within the policy to ensure that the
professional standards are attained, and other challenges that
may arise are avoided. Though personal use is permitted the
expectation is that individuals must do it responsibly. Failure
to adhere to the set rules attract disciplinary action. Severe
breaches of the set rules can draw greater penalties including
dismissal from Zabco Company.
Communication plays an essential role in ensuring that business
activities and operations are conducted smoothly, and
productivity remains high. The company has highly invested in
IT to ensure that better and more effective communication
facilities are put in place. For this reason, therefore the
company places a high emphasis on how individuals
communicate amongst themselves and another stakeholder
within the organization. Employees are encouraged to adopt
effective and responsible communication behavior and
approaches that create a conducive environment for business to
grow.
We trust that every employee will use this policy responsibly.
The content in this policy applies to all the employees within
Zabco Company. Employees at different management levels are
required to adhere to the rules set and stipulated in this policy.
This includes the managers, supervisors, contract and full-time
employees, trainees and agencies that work with the company.
In general, any individual who works directly or indirectly with
the customers is expected to adhere to the rules set in this
policy. Even though the policy addresses use of email and
internet, the overall rule is that same standard must also be
observed in use of fax, telephone and other equipment used in
communication.
2.0 General principles
I. All information relating to business operations and customers
must be treated and handled as confidential. Such information is
not to be shared or used without proper authorization.
II. All communication facilities must be used in a respectful,
lawful and responsible manner that causes no form of harm on
either the employees or any stakeholder.
III. Copying, processing, uploading, downloading and
distributing materials that are considered to be confidential is
not allowed by the company. Such acts would be deemed to
have infringed the copyright or other intellectual property
rights.
IV. Employees must take care when sharing or give information
either using the email, internet or the company blog. Individuals
are personally liable for any errors or miscommunication that
may arise from information they have shared over the internet.
V. Though it is easy and fast to send messages and information
via the internet, individuals should not send ill-considered
information. Every email sent must demonstrate high levels of
professionalism and ethical standards. One should not use these
media to communicate information that might be later
considered as illegal such as discrimination. Discrimination by
sex, religion gender, race, sexuality or any other basis is not
allowed by the company. Defamatory and unlawful materials
should not be shared using these media. Any form of
harassment or bullying is equally considered an infringement of
this policy and attract disciplinary action. Employees are
advised to seek clarification from their immediate supervisors.
VI. Employees are expected to operate by good faith. The
assumption is that the employees are trustworthy enough to
engage in a responsible manner that leads to the achievement of
organizational goals. Individuals are personally liable for lack
of adherence to the set rules and regulations within the policy.
This, therefore, implies that the employees may not be strictly
supervised to ensure that they follow the rules. They are
expected to observe the rules with minimal supervision.
3.0 Use of emails
I. The employee is permitted to delete personal emails sent
through official work emails. However, a copy of the mail will
have been captured and saved in the backup.
II. When an individual accepts to send or receive emails, it
implies that they agreed to the terms and conditions set in this
policy. Ignorance would not be used as a defense from any
breach of this agreement.
III. Use of emails during working hours must also adhere to the
same rules as those that apply to the use of the internet. The
employee equally implies that they have consented to regular
monitoring of personal email as stipulated in this policy.
IV. If an employee sends a personal email from the
communication facilities that belong to the company, they must
mark them as personal. The IT department will offer guidance
to individuals who seek to set up and use personal folder.
V. All information contained in the email including inbox and
sent are subject to scrutiny and monitoring by the company.
VI. The email template must include a disclaimer statement.
Employees should not amend the disclaimer statement in any
way.
VII. Any messages received should not be amended without the
authorization of the other person.
VIII. An employee should not access email messages meant for
other recipients.
IX. Use of emails should not breach the data protection policy
set by the company.
X. If an employee is in doubt on how to use the email, they
should consult or ask assistance from the IT manager.
XI. Employees are encouraged to confirm the content of their
emails before they send them.
XII. Every email intended for business use must have a business
reference
XIII. If an employee sends sensitive information as an
attachment, they must make a follow-up call and confirm that
the recipient has received the attachment.
XIV. The employees are encouraged to maintain a hard copy of
the attachment of an attachment made to the customer. Such
attachment includes any information required for accounting
purposes among others.
XV. Employees are not allowed to send business documents to
personal accounts.
XVI. if one is working in remote areas, they are permitted to
save the document in a disk or retrieve it from the internet.
4.0 Use of internet
I. The company trust that you will be responsible for using the
internet and intranet. It is crucial for you to note that
information identifying your personal computer is captured
whenever you visit a website.
II. The company recognizes the need for employees to conduct
personal activities during the working hours. The following
rule must, therefore, be observed.
III. The activities should not interfere with personal duties
IV. The official duties should be the priority during the working
hours
V. It is advisable that the events should take place during the
breaks, for example, the tea and lunch breaks.
VI. The activity should lead to in current of cost or liability to
Zabco company
VII. The consequences of the activity should not affect Zabco
company in any negative way
VIII. The action should be lawful and right according to this
policy.
IX. When using public sites employees are discouraged not to
use the company’s address detail like email and contacts. This
more specifically relates to using for non-business activities.
The employee must gain authorization from their immediate
supervisors.
X. Employees are not allowed to log in to some websites during
the working hours. If one needs to access or login into such
sites must gain permission from the IT manager.
XI. The employees must not
a) Attempt to gain access to unauthorized areas of the
company’s network.
b) Try to access data that they know is confidential
c) Introduce any form of malware or computer virus that would
destroy the computers.
d) Undertake any hacking activities
e) Introduce soft wares that detect passwords
XII. If any employee wants to engage in the online chat room
using the company’s facilities must be authorized in writing.
XIII. Breaching of items stated in this policy contradicts the
terms of this policy is the following offenses are committed
a) Hacking
b) Unauthorized altering and modification of information or
material
c) Authorized access with the intention of committing an
offense.
XIV. The employees are warned that their activities over the
internet are monitored. They are therefore encouraged to
exercise caution with their activities online as well as activities
during the working hours.
XV. The company’s emails facilities are supposed to be used for
business purpose. However, individual employees are allowed
to use them for personal use occasionally. The employee must
ensure that they adhere to the rules set in this policy. It is
essential for the employee to note that there will be little
privacy because the emails will be subject to scrutiny by the
company. If one desires to achieve higher levels of privacy,
they must then use a personal folder.
XVI. The email facility should not be used for communication
between the company and other companies or customers without
written consent by the immediate supervisor.
5.0 Misuse of the company’s facilities
I. Misuse of facilities refers to any activity either by use of
telephone, emails or internet in a manner that breaches the rules
and regulations set in this policy. Any breach is considered to
be an offense that is to be dealt with as per the disciplinary
procedures.
II. The list below provides acts that will lead to the dismissal of
employees. the list is not exhaustive
a) Sharing of material that is sexually offensive, discriminatory
or offensive
b) Criminal material that can cause embarrassment to the
company, its employees, customers or any stakeholder.
c) Sharing of defamatory information or false information
d) Sharing material with the intention of causing harassment,
annoyance or create anxiety in any person.
e) Sharing of information and data that is considered to be
confidential
f) Sharing any material that can create a liability to the
company
g) Engaging in online gambling activities and games
h) Sending spam emails to customers or employees within the
company
III. If the company gains evidence of misuse of email and
internet facilities, the management reserves the right to
undertake further investigation into the issue and take
appropriate measures as provided by the policies within the
company.
6.0 System security
I. Every employee is expected to fulfill the duty of handling
customers’ data and information with confidentiality.
Employees are therefore encouraged to be careful about the
security implication of what they do. The overall expectation
that facilities and equipment should not be damaged or used in a
manner that is likely to slow down or affect its performance.
II. All confidential information should be kept secure and free
from access by unauthorized persons
III. The passwords should be kept safe and should not be
disclosed to anyone without authorization by the IT manager.
IV. A private document that is shared via the email should be
marked as ‘private and confidential,’ and passwords should be
used to give the user access
V. Confidential data should be printed only when necessary.
VI. Employees should install software from external sources
only when they have gained authorization from the IT manager.
VII. Employees should first get permission from the IT manager
before running any external devices like discs on the company
equipment.
VIII. Caution should be exercised when opening emails from
external sources especially if they look suspicious.
7.0 Working in remote areas
I. The passwords must be protected from access by unauthorized
users
II. One must work in a way that prevents others from reading or
observing their activities
III. The security of the company equipment must always be a
priority to the individual employee.
IV. If one has lost company equipment, they must immediately
report to the police
V. Work done in remote areas should be saved and transferred
to the company systems soonest possible
VI. Handheld devices that contain confidential information must
be protected using passwords.
8.0 Monitoring of communications by the Zabco company
I. The company reserve the rights to monitor connection made
using the company facilities. However, this is done concerning
employees’ privacy and autonomy. The company may monitor
communication for the following reasons:
a) To provide evidence that a business transaction took place
b) To comply with a legal requirement
c) To monitor standards of performance
d) To detect criminal activities or unauthorized access
e) To adhere to the company’s procedures and policies.
f) To ensure that efficiency in business operations is achieved
and maintained.
II. The company will monitor details of communication like
duration of a telephone call, website visited, non-business
activities among others.
III. In some cases, or circumstance the access may be gained in
the absence of the employee.
IV. Emails marked ‘Personal’ may be subject to scrutiny
especially if it is a legal or mandatory requirement based on the
circumstances.
9.0 Compliance with this policy
I. Failure to adhere to this policy will lead to disciplinary action
which may lead to financial cost on the employee, dismissal or
withdrawal of permission from using durable equipment and
facilities.
II. This policy is subject to regular review as the company may
deem possible and necessary
References
Anandarajan, M., Simmers, C. A., & Teo, T. S. (2014). The
Internet and Workplace Transformation: An Introduction.
In The internet and workplace transformation (pp. 13-22).
Routledge.
Anandarajan, M., Simmers, C. A., & Teo, T. S. (2014). The
Internet and Workplace Transformation: An Introduction.
In The internet and workplace transformation (pp. 13-22).
Routledge.
Derks, D., & Bakker, A. B. (2010). The impact of e-mail
communication on organizational life. Cyberpsychology:
Journal of Psychosocial Research on Cyberspace, 4(1).
Ruhnka, J., & Loopesko, W. E. (2013). Risk management of
email and Internet use in the workplace. Journal of Digital
Forensics, Security and Law, 8(3), 1.
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information
security policy compliance model in organizations. Computers
& Security, 56, 70-82.
5
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx

More Related Content

Similar to M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx

Resourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docx
Resourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docxResourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docx
Resourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docxdebishakespeare
 
Social Media: Critical Issues for Employers
Social Media: Critical Issues for EmployersSocial Media: Critical Issues for Employers
Social Media: Critical Issues for Employersdsalmeida
 
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...Kelly Hart & Hallman LLP
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012PBeisty
 
Sample of Social Media policy - HR
Sample of Social Media policy - HR Sample of Social Media policy - HR
Sample of Social Media policy - HR Moses Gomes
 
Employee use of social media - chapter 2. Disciplinary Action and Social Media
Employee use of social media - chapter 2. Disciplinary Action and Social MediaEmployee use of social media - chapter 2. Disciplinary Action and Social Media
Employee use of social media - chapter 2. Disciplinary Action and Social MediaNiki Avraam
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxsusanschei
 
Topic 2 Cutbirth and Love
Topic 2 Cutbirth and LoveTopic 2 Cutbirth and Love
Topic 2 Cutbirth and LoveRobert Cutbirth
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Vijay Dalmia
 
Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureThe Pathway Group
 
Code of Business Conduct and Ethics(Adopted by the Board.docx
Code of Business Conduct and Ethics(Adopted by the Board.docxCode of Business Conduct and Ethics(Adopted by the Board.docx
Code of Business Conduct and Ethics(Adopted by the Board.docxmary772
 
Internet usepolicy
Internet usepolicyInternet usepolicy
Internet usepolicyAnkit Juneja
 
Social media
Social mediaSocial media
Social mediaSheila A
 
Standard 4 - Duties to Employer (N).pdf
Standard 4 - Duties to Employer (N).pdfStandard 4 - Duties to Employer (N).pdf
Standard 4 - Duties to Employer (N).pdfNGCNGHNG4
 
MONITORING EMPLOYEES ON NETWORKS
MONITORING EMPLOYEES ON NETWORKSMONITORING EMPLOYEES ON NETWORKS
MONITORING EMPLOYEES ON NETWORKSSinuSaji1
 
Acceptable Use Policy.docx
Acceptable Use Policy.docxAcceptable Use Policy.docx
Acceptable Use Policy.docxSALU18
 
Employee use of social media - Chapter 1. Employee misuse of internet and ema...
Employee use of social media - Chapter 1. Employee misuse of internet and ema...Employee use of social media - Chapter 1. Employee misuse of internet and ema...
Employee use of social media - Chapter 1. Employee misuse of internet and ema...Niki Avraam
 

Similar to M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx (20)

Resourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docx
Resourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docxResourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docx
Resourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docx
 
Staff newsletter
Staff newsletterStaff newsletter
Staff newsletter
 
Social Media: Critical Issues for Employers
Social Media: Critical Issues for EmployersSocial Media: Critical Issues for Employers
Social Media: Critical Issues for Employers
 
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012
 
Sample of Social Media policy - HR
Sample of Social Media policy - HR Sample of Social Media policy - HR
Sample of Social Media policy - HR
 
Employee use of social media - chapter 2. Disciplinary Action and Social Media
Employee use of social media - chapter 2. Disciplinary Action and Social MediaEmployee use of social media - chapter 2. Disciplinary Action and Social Media
Employee use of social media - chapter 2. Disciplinary Action and Social Media
 
Internet Misuse inside the Company
Internet Misuse inside the CompanyInternet Misuse inside the Company
Internet Misuse inside the Company
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
 
Topic 2 Cutbirth and Love
Topic 2 Cutbirth and LoveTopic 2 Cutbirth and Love
Topic 2 Cutbirth and Love
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
 
Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and Procedure
 
Code of Business Conduct and Ethics(Adopted by the Board.docx
Code of Business Conduct and Ethics(Adopted by the Board.docxCode of Business Conduct and Ethics(Adopted by the Board.docx
Code of Business Conduct and Ethics(Adopted by the Board.docx
 
Internet usepolicy
Internet usepolicyInternet usepolicy
Internet usepolicy
 
Social media
Social mediaSocial media
Social media
 
Standard 4 - Duties to Employer (N).pdf
Standard 4 - Duties to Employer (N).pdfStandard 4 - Duties to Employer (N).pdf
Standard 4 - Duties to Employer (N).pdf
 
RIGHT_TO_PRIVACY_OR_NOT
RIGHT_TO_PRIVACY_OR_NOTRIGHT_TO_PRIVACY_OR_NOT
RIGHT_TO_PRIVACY_OR_NOT
 
MONITORING EMPLOYEES ON NETWORKS
MONITORING EMPLOYEES ON NETWORKSMONITORING EMPLOYEES ON NETWORKS
MONITORING EMPLOYEES ON NETWORKS
 
Acceptable Use Policy.docx
Acceptable Use Policy.docxAcceptable Use Policy.docx
Acceptable Use Policy.docx
 
Employee use of social media - Chapter 1. Employee misuse of internet and ema...
Employee use of social media - Chapter 1. Employee misuse of internet and ema...Employee use of social media - Chapter 1. Employee misuse of internet and ema...
Employee use of social media - Chapter 1. Employee misuse of internet and ema...
 

More from smile790243

PART B Please response to these two original posts below. Wh.docx
PART B Please response to these two original posts below. Wh.docxPART B Please response to these two original posts below. Wh.docx
PART B Please response to these two original posts below. Wh.docxsmile790243
 
Part C Developing Your Design SolutionThe Production Cycle.docx
Part C Developing Your Design SolutionThe Production Cycle.docxPart C Developing Your Design SolutionThe Production Cycle.docx
Part C Developing Your Design SolutionThe Production Cycle.docxsmile790243
 
PART A You will create a media piece based around the theme of a.docx
PART A You will create a media piece based around the theme of a.docxPART A You will create a media piece based around the theme of a.docx
PART A You will create a media piece based around the theme of a.docxsmile790243
 
Part 4. Implications to Nursing Practice & Implication to Patien.docx
Part 4. Implications to Nursing Practice & Implication to Patien.docxPart 4. Implications to Nursing Practice & Implication to Patien.docx
Part 4. Implications to Nursing Practice & Implication to Patien.docxsmile790243
 
PART AHepatitis C is a chronic liver infection that can be e.docx
PART AHepatitis C is a chronic liver infection that can be e.docxPART AHepatitis C is a chronic liver infection that can be e.docx
PART AHepatitis C is a chronic liver infection that can be e.docxsmile790243
 
Part A post your answer to the following question1. How m.docx
Part A post your answer to the following question1. How m.docxPart A post your answer to the following question1. How m.docx
Part A post your answer to the following question1. How m.docxsmile790243
 
PART BPlease response to these two original posts below..docx
PART BPlease response to these two original posts below..docxPART BPlease response to these two original posts below..docx
PART BPlease response to these two original posts below..docxsmile790243
 
Part A (50 Points)Various men and women throughout history .docx
Part A (50 Points)Various men and women throughout history .docxPart A (50 Points)Various men and women throughout history .docx
Part A (50 Points)Various men and women throughout history .docxsmile790243
 
Part A1. K2. D3. N4. C5. A6. O7. F8. Q9. H10..docx
Part A1. K2. D3. N4. C5. A6. O7. F8. Q9. H10..docxPart A1. K2. D3. N4. C5. A6. O7. F8. Q9. H10..docx
Part A1. K2. D3. N4. C5. A6. O7. F8. Q9. H10..docxsmile790243
 
Part A Develop an original age-appropriate activity for your .docx
Part A Develop an original age-appropriate activity for your .docxPart A Develop an original age-appropriate activity for your .docx
Part A Develop an original age-appropriate activity for your .docxsmile790243
 
Part 3 Social Situations2. Identify multicultural challenges th.docx
Part 3 Social Situations2. Identify multicultural challenges th.docxPart 3 Social Situations2. Identify multicultural challenges th.docx
Part 3 Social Situations2. Identify multicultural challenges th.docxsmile790243
 
Part A (1000 words) Annotated Bibliography - Create an annota.docx
Part A (1000 words) Annotated Bibliography - Create an annota.docxPart A (1000 words) Annotated Bibliography - Create an annota.docx
Part A (1000 words) Annotated Bibliography - Create an annota.docxsmile790243
 
Part 6 Disseminating Results Create a 5-minute, 5- to 6-sli.docx
Part 6 Disseminating Results Create a 5-minute, 5- to 6-sli.docxPart 6 Disseminating Results Create a 5-minute, 5- to 6-sli.docx
Part 6 Disseminating Results Create a 5-minute, 5- to 6-sli.docxsmile790243
 
Part 3 Social Situations • Proposal paper which identifies multicul.docx
Part 3 Social Situations • Proposal paper which identifies multicul.docxPart 3 Social Situations • Proposal paper which identifies multicul.docx
Part 3 Social Situations • Proposal paper which identifies multicul.docxsmile790243
 
Part 3 Social Situations 2. Identify multicultural challenges that .docx
Part 3 Social Situations 2. Identify multicultural challenges that .docxPart 3 Social Situations 2. Identify multicultural challenges that .docx
Part 3 Social Situations 2. Identify multicultural challenges that .docxsmile790243
 
Part 2The client is a 32-year-old Hispanic American male who c.docx
Part 2The client is a 32-year-old Hispanic American male who c.docxPart 2The client is a 32-year-old Hispanic American male who c.docx
Part 2The client is a 32-year-old Hispanic American male who c.docxsmile790243
 
Part 2For this section of the template, focus on gathering deta.docx
Part 2For this section of the template, focus on gathering deta.docxPart 2For this section of the template, focus on gathering deta.docx
Part 2For this section of the template, focus on gathering deta.docxsmile790243
 
Part 2 Observation Summary and Analysis • Summary paper of observat.docx
Part 2 Observation Summary and Analysis • Summary paper of observat.docxPart 2 Observation Summary and Analysis • Summary paper of observat.docx
Part 2 Observation Summary and Analysis • Summary paper of observat.docxsmile790243
 
Part 2 Observation Summary and Analysis 1. Review and implement any.docx
Part 2 Observation Summary and Analysis 1. Review and implement any.docxPart 2 Observation Summary and Analysis 1. Review and implement any.docx
Part 2 Observation Summary and Analysis 1. Review and implement any.docxsmile790243
 
Part 2Data collectionfrom your change study initiative,.docx
Part 2Data collectionfrom your change study initiative,.docxPart 2Data collectionfrom your change study initiative,.docx
Part 2Data collectionfrom your change study initiative,.docxsmile790243
 

More from smile790243 (20)

PART B Please response to these two original posts below. Wh.docx
PART B Please response to these two original posts below. Wh.docxPART B Please response to these two original posts below. Wh.docx
PART B Please response to these two original posts below. Wh.docx
 
Part C Developing Your Design SolutionThe Production Cycle.docx
Part C Developing Your Design SolutionThe Production Cycle.docxPart C Developing Your Design SolutionThe Production Cycle.docx
Part C Developing Your Design SolutionThe Production Cycle.docx
 
PART A You will create a media piece based around the theme of a.docx
PART A You will create a media piece based around the theme of a.docxPART A You will create a media piece based around the theme of a.docx
PART A You will create a media piece based around the theme of a.docx
 
Part 4. Implications to Nursing Practice & Implication to Patien.docx
Part 4. Implications to Nursing Practice & Implication to Patien.docxPart 4. Implications to Nursing Practice & Implication to Patien.docx
Part 4. Implications to Nursing Practice & Implication to Patien.docx
 
PART AHepatitis C is a chronic liver infection that can be e.docx
PART AHepatitis C is a chronic liver infection that can be e.docxPART AHepatitis C is a chronic liver infection that can be e.docx
PART AHepatitis C is a chronic liver infection that can be e.docx
 
Part A post your answer to the following question1. How m.docx
Part A post your answer to the following question1. How m.docxPart A post your answer to the following question1. How m.docx
Part A post your answer to the following question1. How m.docx
 
PART BPlease response to these two original posts below..docx
PART BPlease response to these two original posts below..docxPART BPlease response to these two original posts below..docx
PART BPlease response to these two original posts below..docx
 
Part A (50 Points)Various men and women throughout history .docx
Part A (50 Points)Various men and women throughout history .docxPart A (50 Points)Various men and women throughout history .docx
Part A (50 Points)Various men and women throughout history .docx
 
Part A1. K2. D3. N4. C5. A6. O7. F8. Q9. H10..docx
Part A1. K2. D3. N4. C5. A6. O7. F8. Q9. H10..docxPart A1. K2. D3. N4. C5. A6. O7. F8. Q9. H10..docx
Part A1. K2. D3. N4. C5. A6. O7. F8. Q9. H10..docx
 
Part A Develop an original age-appropriate activity for your .docx
Part A Develop an original age-appropriate activity for your .docxPart A Develop an original age-appropriate activity for your .docx
Part A Develop an original age-appropriate activity for your .docx
 
Part 3 Social Situations2. Identify multicultural challenges th.docx
Part 3 Social Situations2. Identify multicultural challenges th.docxPart 3 Social Situations2. Identify multicultural challenges th.docx
Part 3 Social Situations2. Identify multicultural challenges th.docx
 
Part A (1000 words) Annotated Bibliography - Create an annota.docx
Part A (1000 words) Annotated Bibliography - Create an annota.docxPart A (1000 words) Annotated Bibliography - Create an annota.docx
Part A (1000 words) Annotated Bibliography - Create an annota.docx
 
Part 6 Disseminating Results Create a 5-minute, 5- to 6-sli.docx
Part 6 Disseminating Results Create a 5-minute, 5- to 6-sli.docxPart 6 Disseminating Results Create a 5-minute, 5- to 6-sli.docx
Part 6 Disseminating Results Create a 5-minute, 5- to 6-sli.docx
 
Part 3 Social Situations • Proposal paper which identifies multicul.docx
Part 3 Social Situations • Proposal paper which identifies multicul.docxPart 3 Social Situations • Proposal paper which identifies multicul.docx
Part 3 Social Situations • Proposal paper which identifies multicul.docx
 
Part 3 Social Situations 2. Identify multicultural challenges that .docx
Part 3 Social Situations 2. Identify multicultural challenges that .docxPart 3 Social Situations 2. Identify multicultural challenges that .docx
Part 3 Social Situations 2. Identify multicultural challenges that .docx
 
Part 2The client is a 32-year-old Hispanic American male who c.docx
Part 2The client is a 32-year-old Hispanic American male who c.docxPart 2The client is a 32-year-old Hispanic American male who c.docx
Part 2The client is a 32-year-old Hispanic American male who c.docx
 
Part 2For this section of the template, focus on gathering deta.docx
Part 2For this section of the template, focus on gathering deta.docxPart 2For this section of the template, focus on gathering deta.docx
Part 2For this section of the template, focus on gathering deta.docx
 
Part 2 Observation Summary and Analysis • Summary paper of observat.docx
Part 2 Observation Summary and Analysis • Summary paper of observat.docxPart 2 Observation Summary and Analysis • Summary paper of observat.docx
Part 2 Observation Summary and Analysis • Summary paper of observat.docx
 
Part 2 Observation Summary and Analysis 1. Review and implement any.docx
Part 2 Observation Summary and Analysis 1. Review and implement any.docxPart 2 Observation Summary and Analysis 1. Review and implement any.docx
Part 2 Observation Summary and Analysis 1. Review and implement any.docx
 
Part 2Data collectionfrom your change study initiative,.docx
Part 2Data collectionfrom your change study initiative,.docxPart 2Data collectionfrom your change study initiative,.docx
Part 2Data collectionfrom your change study initiative,.docx
 

Recently uploaded

FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of PlayPooky Knightsmith
 

Recently uploaded (20)

FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 

M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx

  • 1. M3 ASSIGNMENT 2 M3 Assignment 2 Iram Bautista B6120: Communication Strategies for Managers Argosy University Professor James Pasch August 11, 2018 Communication Policy on Use of Emails and Internet at Zabco Company This communication policy is aimed at providing guidance on how the employees within Zabco Company are to use the internet and emails. The assumption is that limited personal use of internet and email is not limited. 1.0 Introduction The internet and email facilities are provided within the company to ensure that they are used for purposes that benefit the company. All staff members are expected to follow and adhere to the rules set within the policy to ensure that the professional standards are attained, and other challenges that may arise are avoided. Though personal use is permitted the expectation is that individuals must do it responsibly. Failure to adhere to the set rules attract disciplinary action. Severe breaches of the set rules can draw greater penalties including dismissal from Zabco Company. Communication plays an essential role in ensuring that business activities and operations are conducted smoothly, and productivity remains high. The company has highly invested in IT to ensure that better and more effective communication facilities are put in place. For this reason, therefore the
  • 2. company places a high emphasis on how individuals communicate amongst themselves and another stakeholder within the organization. Employees are encouraged to adopt effective and responsible communication behavior and approaches that create a conducive environment for business to grow. We trust that every employee will use this policy responsibly. The content in this policy applies to all the employees within Zabco Company. Employees at different management levels are required to adhere to the rules set and stipulated in this policy. This includes the managers, supervisors, contract and full-time employees, trainees and agencies that work with the company. In general, any individual who works directly or indirectly with the customers is expected to adhere to the rules set in this policy. Even though the policy addresses use of email and internet, the overall rule is that same standard must also be observed in use of fax, telephone and other equipment used in communication. 2.0 General principles I. All information relating to business operations and customers must be treated and handled as confidential. Such information is not to be shared or used without proper authorization. II. All communication facilities must be used in a respectful, lawful and responsible manner that causes no form of harm on either the employees or any stakeholder. III. Copying, processing, uploading, downloading and distributing materials that are considered to be confidential is not allowed by the company. Such acts would be deemed to have infringed the copyright or other intellectual property rights. IV. Employees must take care when sharing or give information
  • 3. either using the email, internet or the company blog. Individuals are personally liable for any errors or miscommunication that may arise from information they have shared over the internet. V. Though it is easy and fast to send messages and information via the internet, individuals should not send ill-considered information. Every email sent must demonstrate high levels of professionalism and ethical standards. One should not use these media to communicate information that might be later considered as illegal such as discrimination. Discrimination by sex, religion gender, race, sexuality or any other basis is not allowed by the company. Defamatory and unlawful materials should not be shared using these media. Any form of harassment or bullying is equally considered an infringement of this policy and attract disciplinary action. Employees are advised to seek clarification from their immediate supervisors. VI. Employees are expected to operate by good faith. The assumption is that the employees are trustworthy enough to engage in a responsible manner that leads to the achievement of organizational goals. Individuals are personally liable for lack of adherence to the set rules and regulations within the policy. This, therefore, implies that the employees may not be strictly supervised to ensure that they follow the rules. They are expected to observe the rules with minimal supervision. 3.0 Use of emails I. The employee is permitted to delete personal emails sent through official work emails. However, a copy of the mail will have been captured and saved in the backup. II. When an individual accepts to send or receive emails, it implies that they agreed to the terms and conditions set in this policy. Ignorance would not be used as a defense from any breach of this agreement.
  • 4. III. Use of emails during working hours must also adhere to the same rules as those that apply to the use of the internet. The employee equally implies that they have consented to regular monitoring of personal email as stipulated in this policy. IV. If an employee sends a personal email from the communication facilities that belong to the company, they must mark them as personal. The IT department will offer guidance to individuals who seek to set up and use personal folder. V. All information contained in the email including inbox and sent are subject to scrutiny and monitoring by the company. VI. The email template must include a disclaimer statement. Employees should not amend the disclaimer statement in any way. VII. Any messages received should not be amended without the authorization of the other person. VIII. An employee should not access email messages meant for other recipients. IX. Use of emails should not breach the data protection policy set by the company. X. If an employee is in doubt on how to use the email, they should consult or ask assistance from the IT manager. XI. Employees are encouraged to confirm the content of their emails before they send them. XII. Every email intended for business use must have a business reference XIII. If an employee sends sensitive information as an attachment, they must make a follow-up call and confirm that the recipient has received the attachment.
  • 5. XIV. The employees are encouraged to maintain a hard copy of the attachment of an attachment made to the customer. Such attachment includes any information required for accounting purposes among others. XV. Employees are not allowed to send business documents to personal accounts. XVI. if one is working in remote areas, they are permitted to save the document in a disk or retrieve it from the internet. 4.0 Use of internet I. The company trust that you will be responsible for using the internet and intranet. It is crucial for you to note that information identifying your personal computer is captured whenever you visit a website. II. The company recognizes the need for employees to conduct personal activities during the working hours. The following rule must, therefore, be observed. III. The activities should not interfere with personal duties IV. The official duties should be the priority during the working hours V. It is advisable that the events should take place during the breaks, for example, the tea and lunch breaks. VI. The activity should lead to in current of cost or liability to Zabco company VII. The consequences of the activity should not affect Zabco company in any negative way
  • 6. VIII. The action should be lawful and right according to this policy. IX. When using public sites employees are discouraged not to use the company’s address detail like email and contacts. This more specifically relates to using for non-business activities. The employee must gain authorization from their immediate supervisors. X. Employees are not allowed to log in to some websites during the working hours. If one needs to access or login into such sites must gain permission from the IT manager. XI. The employees must not a) Attempt to gain access to unauthorized areas of the company’s network. b) Try to access data that they know is confidential c) Introduce any form of malware or computer virus that would destroy the computers. d) Undertake any hacking activities e) Introduce soft wares that detect passwords XII. If any employee wants to engage in the online chat room using the company’s facilities must be authorized in writing. XIII. Breaching of items stated in this policy contradicts the terms of this policy is the following offenses are committed a) Hacking b) Unauthorized altering and modification of information or
  • 7. material c) Authorized access with the intention of committing an offense. XIV. The employees are warned that their activities over the internet are monitored. They are therefore encouraged to exercise caution with their activities online as well as activities during the working hours. XV. The company’s emails facilities are supposed to be used for business purpose. However, individual employees are allowed to use them for personal use occasionally. The employee must ensure that they adhere to the rules set in this policy. It is essential for the employee to note that there will be little privacy because the emails will be subject to scrutiny by the company. If one desires to achieve higher levels of privacy, they must then use a personal folder. XVI. The email facility should not be used for communication between the company and other companies or customers without written consent by the immediate supervisor. 5.0 Misuse of the company’s facilities I. Misuse of facilities refers to any activity either by use of telephone, emails or internet in a manner that breaches the rules and regulations set in this policy. Any breach is considered to be an offense that is to be dealt with as per the disciplinary procedures. II. The list below provides acts that will lead to the dismissal of employees. the list is not exhaustive a) Sharing of material that is sexually offensive, discriminatory or offensive
  • 8. b) Criminal material that can cause embarrassment to the company, its employees, customers or any stakeholder. c) Sharing of defamatory information or false information d) Sharing material with the intention of causing harassment, annoyance or create anxiety in any person. e) Sharing of information and data that is considered to be confidential f) Sharing any material that can create a liability to the company g) Engaging in online gambling activities and games h) Sending spam emails to customers or employees within the company III. If the company gains evidence of misuse of email and internet facilities, the management reserves the right to undertake further investigation into the issue and take appropriate measures as provided by the policies within the company. 6.0 System security I. Every employee is expected to fulfill the duty of handling customers’ data and information with confidentiality. Employees are therefore encouraged to be careful about the security implication of what they do. The overall expectation that facilities and equipment should not be damaged or used in a manner that is likely to slow down or affect its performance. II. All confidential information should be kept secure and free from access by unauthorized persons III. The passwords should be kept safe and should not be
  • 9. disclosed to anyone without authorization by the IT manager. IV. A private document that is shared via the email should be marked as ‘private and confidential,’ and passwords should be used to give the user access V. Confidential data should be printed only when necessary. VI. Employees should install software from external sources only when they have gained authorization from the IT manager. VII. Employees should first get permission from the IT manager before running any external devices like discs on the company equipment. VIII. Caution should be exercised when opening emails from external sources especially if they look suspicious. 7.0 Working in remote areas I. The passwords must be protected from access by unauthorized users II. One must work in a way that prevents others from reading or observing their activities III. The security of the company equipment must always be a priority to the individual employee. IV. If one has lost company equipment, they must immediately report to the police V. Work done in remote areas should be saved and transferred to the company systems soonest possible VI. Handheld devices that contain confidential information must be protected using passwords.
  • 10. 8.0 Monitoring of communications by the Zabco company I. The company reserve the rights to monitor connection made using the company facilities. However, this is done concerning employees’ privacy and autonomy. The company may monitor communication for the following reasons: a) To provide evidence that a business transaction took place b) To comply with a legal requirement c) To monitor standards of performance d) To detect criminal activities or unauthorized access e) To adhere to the company’s procedures and policies. f) To ensure that efficiency in business operations is achieved and maintained. II. The company will monitor details of communication like duration of a telephone call, website visited, non-business activities among others. III. In some cases, or circumstance the access may be gained in the absence of the employee. IV. Emails marked ‘Personal’ may be subject to scrutiny especially if it is a legal or mandatory requirement based on the circumstances. 9.0 Compliance with this policy I. Failure to adhere to this policy will lead to disciplinary action which may lead to financial cost on the employee, dismissal or withdrawal of permission from using durable equipment and
  • 11. facilities. II. This policy is subject to regular review as the company may deem possible and necessary References Anandarajan, M., Simmers, C. A., & Teo, T. S. (2014). The Internet and Workplace Transformation: An Introduction. In The internet and workplace transformation (pp. 13-22). Routledge. Anandarajan, M., Simmers, C. A., & Teo, T. S. (2014). The Internet and Workplace Transformation: An Introduction. In The internet and workplace transformation (pp. 13-22). Routledge. Derks, D., & Bakker, A. B. (2010). The impact of e-mail communication on organizational life. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 4(1). Ruhnka, J., & Loopesko, W. E. (2013). Risk management of email and Internet use in the workplace. Journal of Digital Forensics, Security and Law, 8(3), 1. Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. Computers & Security, 56, 70-82. 5