Instructions: Edit any information below and click "Export Word" to generate the document.
Computer Usage Policy
Policy brief & purpose
Our participant internet usage policy outlines our guidelines for using our company’s internet connection, network and equipment. We want to avoid inappropriate or illegal internet use that creates risks for our company’s legality and reputation.
Scope
This internet usage policy applies to all our employees, contractors, volunteers and partners who access our network, tablets, and computers.
Internet usage policy elements
What is appropriate internet usage?
Participants are advised to use our company’s internet connection for the following reasons:
- To complete their job duties.
- To seek out information that they can use to improve their work.
What is inappropriate internet usage?
Participants must not use our network to:
- Download or upload obscene, offensive or illegal material.
- Send confidential information to unauthorized recipients.
- Invade another person’s privacy and sensitive information.
- Download or upload movies, music and other copyrighted material and software.
- Visit potentially dangerous websites that can compromise the safety of our network and computers.
- Perform unauthorized or illegal actions, like hacking, fraud, buying/selling illegal goods and more.
We also advise our participants to be careful when downloading and opening/executing files and software. If unsure as to whether a file is safe, please ask your TWS contact.
Our company may install anti-virus and disk encryption software on our company computers. Participants may not deactivate or configure settings and firewalls.
We won’t assume any responsibility if participant devices are infected by malicious software, or if their personal data are compromised as a result of inappropriate use.
Company-issued equipment
We expect our participants to respect and protect our company’s equipment. “Company equipment” in this computer usage policy for participants includes company-issued tablets, cases, headsets and any other electronic equipment, and belongs to our company.
Email
Our participants can use their issued email account for work-related purposes only. Employees shouldn’t use their corporate email to:
- Register to illegal, unsafe, disreputable or suspect websites and services.
- Send obscene, offensive or discriminatory messages and content.
- Send unauthorized advertisements or solicitation emails.
- Sign up for a competitor’s services unless authorized.
All use of technology can and will be monitored by Transitional Work Solutions and your employer,
,
including but not limited
to work product, internet searches, email, and phone lines. We also have the right to monitor websites participants visit on our computers and tablets.
Disciplinary Action
Participants who don’t conform to this internet usage policy will face disciplinary action. Serious violations will be cause for termination from the program, or legal action when appropriate. Examples of serious violations are:
- Using our internet connection to steal or engage in other illegal activities.
- Causing our computers to be infected by viruses, worms or other malicious software.
- Sending offensive or inappropriate emails to our customers, colleagues or partners.
In signing, I understand and agree to the above outlined polices for internet and equipment usage while I am participating in the Transitional Work Solutions Work from Home modified program.
| Date |