You are on page 1of 6
IL. Mm. ELECTRONIC COMMUNICATIONS POLICY PURPOSE ‘The purpose of this policy is to establish a company-wide policy regarding the access, use and disclosure of all electronic communications equipment, media and methods of communication as well as the communications themselves. The growing use of computers, Internet, e-mail, cell phones and pagers provides employees and others working for Versar with opportunities for global communication, research and data distribution as well as enhanced productivity. It also raises questions of propriety, privacy and liability that affect both the Company and each employee. This policy sets forth the rules and conditions under which these electronic communications will be conducted by Versar and its employees and with which each employee must agree to in writing to have access to these resources. SCOPE, This policy applies to all employees and consultants of Versar. Inc.. and its subsidiaries that use the Company’s facilities, computers, and electronic communication systems. The Company reserves the right to change or modify this policy at any time for any reason. POLICY A. Ownership The Company owns or leases computers, servers, mobile phones, pagers, communications equipment, software and other devices (electronic communication systems) that are provided to employees and others to conduct the Company's business. The Company also maintains and provides voice mail, e-mail and Internet access, among other methods of communications, so that employees and others may cary out their responsibilities on behalf of the Company. — These electronic communications systems are provided to facilitate effective, secure and proper business communications. B. Privacy All of the information and data contained, transmitted from and to or stored on these electronic communications systems are the property of the Company, are not the property of any employee and there is no individual right or expectation of privacy for this information, data or messages. The Company can monitor, access, restrict access or remove any inform: data that is contained in these electronic communication systems at any time for any reason, Passwords are designed to maintain the confidentiality of the Company’s business related information and to give employees access to all or part of the Company's electronic communications systems as part of their work functions, Passwords are not designed to provide confidentiality with respect to personal messages and documents stored for the employee’s use of the Company’s electronic communications systems. Use The use of these electronic communications systems are for business purposes - the conduct of business within and outside of the Company. The user is expected to act in a professional businesslike manner. Their use, including Internet access, e-mail and voice mail are a privilege and not a right, Inappropriate use or violation of this policy and its Atachment A will result in the cancellation of those privileges and subject employees and consultants to disciplinary action, up to and including termination as well as subject violators to litigation, if and when appropriate. The confidentiality of any message should not be assumed. E-mail, voice mail and other electronic communications are permanent business records of the Company. Even when a message or data is erased, it is still possible to retrieve and read that message or data. Once an electronic communication leaves the Versar electronic system, there is no way to control the number of copies made or to whom they are sent. Occasional personal use and sending of personal e-mails within an employee’s business unit is permitted, provided it does not interfere or diminish an employee's ability to perform their work, infringe on the rights of other employees or adversely affect the Company's business, Under no circumstances shall the electronic communications systems be used for other personal business purposes beyond that described above. Copyright Infringement Employees are responsible for observing copyright laws and licensing agreements that apply to all Company information and data, Company-owned or licensed information, data and software and third party owned or leased information, data and software. Review each software license before copying on a computer or other device to ensure all use is proper and legal. Guidelines for Appropriate Use Provided below is a non-exclusive list of inappropriate conduct and prohibited activities. in using the Company’s electronic communications systems, When considering the propriety of engaging in a particular act, the employee should be guided by both the specific prohibitions stated below and the general objectives expressed by the policy. Inappropriate conduct and prohibited activities include: Using any words, images or references that could be viewed as defamatory, obscene, derogatory or racially, sexually, age, religion, ethnically or otherwise offensive or disruptive to co-workers, customers, suppliers or competitors or as otherwise prohibited by law. Creating, accessing, downloading or transmitting messages or images that might be considered inappropriate in the workplace, including, but not limited to, messages or images that are lewd, sexually explicit, obscene or pornographic and messages or images that might be considered offensive or harassing due to their reference to race, sex, age, sexual orientation, marital preference, religion, national origin, physical or mental disability or other protected status. Using voice-mail, e-mail or the Internet to harass, intimidate or annoy other persons, including co-workers. Spreading "chain mail" and other frivolous communications. Downloading, copying or transmitting software and/or documents protected by patents, copyrights, trade secrets or other intellectual property rights without the consent of the owner of such rights. No software can be used on Company electronic communications systems unless properly licensed. Any employee with a question concerning a copyright or intellectual property issue should contact the Company's Librarian or General Counsel Downloading any software or materials (such as on-line publications) unless the employee has taken appropriate anti-virus measures as available and recommend by the Company's MIS staff. Using encryption devices and encryption software that have not been expressly authorized by the Company. Opening attachments to e-mail messages from an unknown or unidentified external sources without appropriate anti-virus measures as available and recommended by the Company's MIS staff. Such attachments to e-mail messages may contain computer viruses capable of causing substantial damage to the Company’s electronic communications systems. 9. Conducting business or soliciting for political, personal, religious or charitable or commercial ventures outside the scope of your employment and your responsibilities to the Company, beyond that permitted by Company policy. 10. Invading the privacy of others, using another employee’s account or password, gaining unauthorized access to resources or other systems or posting anonymous messages unless otherwise authorized by the Company. 11. Forgery or unauthorized alteration of electronic communications. 12. Transmitting any confidential, proprietary or trade secret information of the Company, including, without limitation information concerning the Company’s finances business operations and marketing without the prior written consent of the General Counsel. Accessing for other than Company business, any confidential, proprietary or trade secrets of other persons or entities, Duty to Report Violations Employees who become aware of violations of this policy must report such violations to their supervisor. An employee's failure to report a violation may result in disciplinary action, up to and including discharge Electronic Etiquette Like all communications, there are some simple but important rules to ensuing electronic communication systems. ‘These rules are based upon common sense and courtesy. Included as attachment A to this policy are rules and guidelines you should follow. They will be updated from time to time No Waiver Any failure by the Company to discipline an employee for violations of this policy shall not constitute a waiver of its right to impose discipline for subsequent violations. Access, Monitoring and Surveillance By accepting employment with the Company, employees consent without prior notification, to the Company (a) monitoring, printing, copying and/or deleting of any voice mail message, e-mail message or other electronic data prepared by the employee and (b) the Company's use of any such voice-mail, e-mail or other electronic data as the Company deems appropriate. Employees acknowledge that the Company’s ability and freedom to monitor, delete and otherwise take action with respect to employee voice-mails, e-mails, Internet usage and other electronic data stored on Company equipment is necessary in order for the Company to protect itself, its business and its employees. Date: 03/20/99 Theodore M. Prociv, President & CEO ACKNOWLEDGMENT Ihave carefully reviewed the Electronic Communication Policy dated March 20,1999. 1 agreed to abide by this policy at all times that I act on behalf of the Company, or otherwise use Company Resources. I understand that a violation of this policy will subject me to disciplinary action, up to and including termination, and may also subject me to litigation, if and when appropriate. J Signature Dlovan Abd Al-hnan Print Name 12/27/2022 Date ATTACHMENT A ELECTRONIC COMMUNICATIONS ETIQUETTE 1. Check e-mail daily and remain within disk space limitations, 2. Delete unwanted or unneeded messages immediately since they take up disk storage. Keep remaining messages to the minimum. Review and delete saved messages and other documents regularly. Keep system stored files to a minimum, Personal files should be downloaded to your personal computer’s hard drive or to a diskette or zip drive. Project files should be stored on the network or archived. Avoid ing your user id or password to another person, Never assume your electronic communications are private nor can they be read only by yourself. Never send or store something that you would be embarrassed having your mother read, be seen on the evening news or explaining to a grand jury. Keep paragraphs and messages short and to the point. Focus on one subject per message, always include a pertinent subject title for all communications and documents. 9. Include your name (like a signature) at the bottom of a message or communication. 10. Capitalize words normally, or to highlight an important point. Capitalizing whole words that are not titles or normal usage is SHOUTING! Remember, it is impolite to yell. 11. *Asterisks* surrounding a word can be used to make a stronger point. 12. Never send chain letters through electronic communication systems. 13. Use discretion and common sense when forwarding e-mail or communications to group addresses and distribution lists. 14. Do not repeat the entire message or communication when you are replying when it is not necessary. 15. Be polite. Use taste, judgement and common sense when communicating with others. Always use appropriate language. 16. Do not use the electronic communications systems in any way that would disrupt their use by other users. With thanks to The Net; User Guidelines and Netiquette by Arlene Rinaldi and Florida Atlantic University.

You might also like