Email, software, and Internet access assigned to an employee’s computer and the telephone and voicemail are solely for the purpose of conducting company business. Some job responsibilities at the company require access to the internet and the use of software in addition to the Microsoft Office suite of products.
Only people appropriately authorized, for company purposes, may use the internet to access and download additional software. This authorization is generally exclusive to decisions that the information technology (IT) department makes in conjunction with human resources.
Software Access Procedure
Any additional software beyond the standard configuration must be authorized by your manager and either installed by the IT department or as one of the approved apps on the Microsoft Store.
If you need access to websites or other resources that are currently not approved, talk with your manager and consult with the IT department to explain your need.
All reasonable requests that are not considered a network risk will be considered. The purpose of this policy is not to restrict employee access to software and other resources rather, the goal is to minimize the risk to the organization’s network to security breaches.
Any desktop/laptop computer or device including, but not limited to, desk phones, printers, smartphones, tablets, and tablets that the company provides for your use, should be used strictly for company business.
Keep in mind that the company owns the devices and the information on these devices. If you leave the company for any reason, the company will require that you return the equipment on your last day of work.
The company recognizes that “life happens” at times so a reasonable amount of personal usage is allowed. If it becomes a problem, it might result in disciplinary action.
You may use personal electronic devices that are not connected to the company network to access any appropriate internet site during breaks and lunch.
Internet use on company time or using company-owned devices that are connected to the company network is authorized to conduct company business only. This minimizes the potential of breaches of the security of confidential company information.
Internet use also creates the possibility of contamination to our system via viruses or spyware. Spyware allows unauthorized people outside of the company to potential access to company passwords and other confidential information.