Sei sulla pagina 1di 7

Sample internet use

policy
Page |1

Internet use policy


Context and overview
Key details
 Policy prepared by: [Raluca]
 Approved by board / management on: [date]
 Policy became operational on: [date]
 Next review date: [date]

Introduction
Our Company makes internet access available to its employees where relevant and
useful for their jobs.

This internet use policy describes the rules governing internet use at the company. It
also sets out how staff members are expected to behave when using the internet.

This policy should be read alongside other key policies. The company’s data protection
and email policies are particularly relevant to staff who use the internet.

Why this policy exists


The internet is a powerful tool that can bring significant benefits to Our Company.

However, it’s important every person at the company who uses the internet
understands how to use it responsibly, safely and legally.

This internet use policy:

 Company employees are expected to use the Internet responsibly and


productively.

 Restrictions and rights – can and can’t does

 Internet access is limited to job-related activities only and personal use is


not permitted

 All Internet data that is composed, transmitted and/or received by


<company's> computer systems is considered to belong to <company>
and is recognized as part of its official data. It is therefore subject to
disclosure for legal reasons or to other appropriate third parties

Policy scope (to whom does it apply)


This policy applies to all employees, visitors, contractors, volunteers at Our Company
who use the company’s internet on work time.
Page |2

It applies no matter whether that internet access takes place

 work
 home from work laptop
 traveling for bussines

It applies to use of the internet on any device that is owned by the company, or that
is connected to any company networks or systems.

For example, it applies both to an employee using the internet

 wired work connection


 wireless on your own mobile device

General internet guidelines


Internet use is encouraged
Our Company recognises that the internet is an integral part of doing business. It
therefore encourages its employees to use the internet whenever such use supports
the company’s goals and objectives.

For instance, staff members may use the internet to:

 do research / solutions
 business communications
 Purchase office supplies

Personal internet use


The company also recognises that the internet is embedded in many people’s daily
lives. As such, it allows employees to use the internet for personal reasons, with the
following stipulations:

 During breaks

 Respect the other rules

 Do not affect network performance

Authorised users
Only people who have been authorised to use the internet at Our Company may do
so.

Authorisation is usually provided by

 It administrator
Page |3

 When requested
 How?

Unauthorised use of the company’s internet connection is prohibited.

Employees who use the internet without authorisation — or who provide access to
unauthorised people — may have disciplinary action taken against them.

Key areas
Internet security
Used unwisely, the internet can be a source of security problems that can do
significant damage to the company’s data and reputation.

 How/when can the company’s data/assets be compromised? (What


should the employees not do?)

 To ensure security, avoid the spread of viruses & malware, and to


maintain The Company’s Internet Usage Policies or Acceptable Use
Policies, employees may only access the Internet through a computer
attached to The Company's network and approved Internet firewall or
other security device(s). Bypassing The Company's computer network
security by accessing the Internet directly by personal connections such
as (but not limited to) Cellular Networks, Wimax, modems, or proxy
avoidance techniques or by any other means is strictly prohibited.

Staff members must always consider the security of the company’s systems and data
when using the internet. If required, help and guidance is available from line managers
and the company IT department.

Inappropriate content and uses


There are many sources of inappropriate content and materials available online. It is
important for employees to understand that viewing or distributing inappropriate
content is not acceptable under any circumstances.

Users must not:

 What about inappropriate content?

Inappropriate content includes: pornography, racial or religious slurs,


gender-specific comments, information encouraging criminal skills or
terrorism, or materials relating to cults, gambling and illegal drugs.

This definition of inappropriate content or material also covers any text,


images or other media that could reasonably offend someone on the basis
Page |4

of race, age, sex, religious or political beliefs, national origin, disability,


sexual orientation, or any other characteristic protected by law.

 What about criminal/illegal activities?

 Unless expressly authorized to do so, Users are prohibited from sending,


transmitting, or otherwise distributing proprietary information, data,
trade secrets or other confidential information belonging to The
Company. Unauthorized dissemination of such material may result in
severe disciplinary action as well as substantial civil and criminal penalties
under State and Federal Economic Espionage laws.

Copyright
Our Company respects and operates within copyright laws. Users may not use the
internet to:

 Users may not illegally copy material protected under copyright law or make
that material available to others for copying. You are responsible for
complying with copyright law and applicable licenses that may apply to
software, files, graphics, documents, messages, and other material you wish
to download or copy. You may not agree to a license or download any
material for which a registration fee is charged without first obtaining the
express written permission of the company.

Employees must not use the company’s equipment, software or internet connection
to perform any tasks which may involve breach of copyright law.

Policy enforcement
Monitoring internet use
Company IT and internet resources — including computers, smart phones and
internet connections — are provided for legitimate business use.

The company therefore reserves the right to

 Employees should have no expectation of privacy in anything they create,


store, post, send or receive using the company's computer equipment. The
computer network is the property of The Company and may be used only for
Company purposes.
 Waiver of privacy rights. User expressly waives any right of privacy in anything
they create, store, post, send or receive using the company's computer
equipment or Internet access. User consents to allow company personnel
access to and review of all materials created, stored, sent or received by User
through any Company network or Internet connection.

Page |5

 Monitoring of computer and Internet usage. The Company has the right to
monitor and log and archive any and all aspects of its Computer system
including, but not limited to, monitoring Internet sites visited by Users,
monitoring chat and newsgroups, monitoring file downloads, and all
communications sent and received by users via Email, IM & Chat & Social
Networking.
 The Company has the right to utilize hardware and software that makes it
possible to identify and block access to Internet sites containing sexually
explicit or other material deemed inappropriate in the workplace.
 The Company has the right to utilize hardware and software that makes it
possible to identify and block access to Internet sites containing non-work-
related content such as (but not limited to) Drug Abuse; Hacking; Illegal or
Unethical; Discrimination; Violence; Proxy Avoidance; Plagiarism; Child Abuse;
Alternative Beliefs; Adult Materials; Advocacy Organizations; Gambling;
Extremist Groups; Nudity and Risqué; Pornography; Tasteless; Weapons;
Sexual Content; Sex Education; Alcohol; Tobacco; Lingerie and Swimsuit;
Sports; Hunting; War Games; Online Gaming; Freeware and Software
Downloads; File Sharing and Offsite Storage; Streaming Media; Peer-to-peer
File Sharing; Internet Radio or TV; Internet Telephony; Online Shopping;
Malicious Websites; Phishing; SPAM; Advertising; Brokerage and Trading;
Web-Based Personal Email; Entertainment; Arts and Culture; Education;
Health and Wellness; Job Search; Medicine; News and Media; Social
Networking; Political Organizations; Reference; Religion; Travel; Personal
Vehicles; Dynamic Content; Folklore; Web Chat; Instant Messaging or IM;
Newsgroups and Message Boards; Digital Postcards; Education; Real Estate;
Restaurant or Dining; Personal Websites or Blogs; Content Servers; Domain
Parking; Personal Privacy; Finance and Banking; Search Engines and Portals;
Government and Legal Organizations; Web Hosting; Secure Sites; or Web-
based Applications.

Additionally, all internet data written, sent or received through the company’s
computer systems is part of official Our Company records. The company can be legally
compelled to show that information to law enforcement agencies or other parties.

Users should always ensure that the business information sent over or uploaded to
the internet is accurate, appropriate, ethical, and legal.

Potential sanctions
Knowingly breaching this internet use policy is a serious matter. Users who do so will
be subject to

Employees who don’t conform to this employee internet usage policy will face
disciplinary action. Serious violations will be cause for termination of employment,
or legal action when appropriate. Examples of serious violations are:

Using our internet connection to steal or engage in other illegal activities.


Page |6

Causing our computers to be infected by viruses, worms or other malicious software.

Sending offensive or inappropriate emails to our customers, colleagues or partners.

Potrebbero piacerti anche