IL.
Mm.
ELECTRONIC COMMUNICATIONS POLICY
PURPOSE
‘The purpose of this policy is to establish a company-wide policy regarding the
access, use and disclosure of all electronic communications equipment, media and
methods of communication as well as the communications themselves. The
growing use of computers, Internet, e-mail, cell phones and pagers provides
employees and others working for Versar with opportunities for global
communication, research and data distribution as well as enhanced productivity.
It also raises questions of propriety, privacy and liability that affect both the
Company and each employee. This policy sets forth the rules and conditions
under which these electronic communications will be conducted by Versar and its
employees and with which each employee must agree to in writing to have access
to these resources.
SCOPE,
This policy applies to all employees and consultants of Versar. Inc.. and its
subsidiaries that use the Company’s facilities, computers, and electronic
communication systems. The Company reserves the right to change or modify
this policy at any time for any reason.
POLICY
A. Ownership
The Company owns or leases computers, servers, mobile phones, pagers,
communications equipment, software and other devices (electronic
communication systems) that are provided to employees and others to
conduct the Company's business. The Company also maintains and
provides voice mail, e-mail and Internet access, among other methods of
communications, so that employees and others may cary out their
responsibilities on behalf of the Company. — These electronic
communications systems are provided to facilitate effective, secure and
proper business communications.
B. Privacy
All of the information and data contained, transmitted from and to or stored
on these electronic communications systems are the property of the
Company, are not the property of any employee and there is no individual
right or expectation of privacy for this information, data or messages. The
Company can monitor, access, restrict access or remove any inform:data that is contained in these electronic communication systems at any time
for any reason, Passwords are designed to maintain the confidentiality of
the Company’s business related information and to give employees access to
all or part of the Company's electronic communications systems as part of
their work functions, Passwords are not designed to provide confidentiality
with respect to personal messages and documents stored for the employee’s
use of the Company’s electronic communications systems.
Use
The use of these electronic communications systems are for business
purposes - the conduct of business within and outside of the Company. The
user is expected to act in a professional businesslike manner. Their use,
including Internet access, e-mail and voice mail are a privilege and not a
right, Inappropriate use or violation of this policy and its Atachment A will
result in the cancellation of those privileges and subject employees and
consultants to disciplinary action, up to and including termination as well as
subject violators to litigation, if and when appropriate.
The confidentiality of any message should not be assumed. E-mail, voice
mail and other electronic communications are permanent business records of
the Company. Even when a message or data is erased, it is still possible to
retrieve and read that message or data. Once an electronic communication
leaves the Versar electronic system, there is no way to control the number of
copies made or to whom they are sent.
Occasional personal use and sending of personal e-mails within an
employee’s business unit is permitted, provided it does not interfere or
diminish an employee's ability to perform their work, infringe on the rights
of other employees or adversely affect the Company's business, Under no
circumstances shall the electronic communications systems be used for other
personal business purposes beyond that described above.
Copyright Infringement
Employees are responsible for observing copyright laws and licensing
agreements that apply to all Company information and data,
Company-owned or licensed information, data and software and third party
owned or leased information, data and software. Review each software
license before copying on a computer or other device to ensure all use is
proper and legal.
Guidelines for Appropriate Use
Provided below is a non-exclusive list of inappropriate conduct and
prohibited activities. in using the Company’s electroniccommunications systems, When considering the propriety of engaging
in a particular act, the employee should be guided by both the specific
prohibitions stated below and the general objectives expressed by the
policy. Inappropriate conduct and prohibited activities include:
Using any words, images or references that could be viewed as
defamatory, obscene, derogatory or racially, sexually, age, religion,
ethnically or otherwise offensive or disruptive to co-workers,
customers, suppliers or competitors or as otherwise prohibited by law.
Creating, accessing, downloading or transmitting messages or images
that might be considered inappropriate in the workplace, including, but
not limited to, messages or images that are lewd, sexually explicit,
obscene or pornographic and messages or images that might be
considered offensive or harassing due to their reference to race, sex,
age, sexual orientation, marital preference, religion, national origin,
physical or mental disability or other protected status.
Using voice-mail, e-mail or the Internet to harass, intimidate or annoy
other persons, including co-workers.
Spreading "chain mail" and other frivolous communications.
Downloading, copying or transmitting software and/or documents
protected by patents, copyrights, trade secrets or other intellectual
property rights without the consent of the owner of such rights. No
software can be used on Company electronic communications systems
unless properly licensed. Any employee with a question concerning a
copyright or intellectual property issue should contact the Company's
Librarian or General Counsel
Downloading any software or materials (such as on-line publications)
unless the employee has taken appropriate anti-virus measures as
available and recommend by the Company's MIS staff.
Using encryption devices and encryption software that have not been
expressly authorized by the Company.
Opening attachments to e-mail messages from an unknown or
unidentified external sources without appropriate anti-virus measures
as available and recommended by the Company's MIS staff. Such
attachments to e-mail messages may contain computer viruses capable
of causing substantial damage to the Company’s electronic
communications systems.9. Conducting business or soliciting for political, personal, religious or
charitable or commercial ventures outside the scope of your
employment and your responsibilities to the Company, beyond that
permitted by Company policy.
10. Invading the privacy of others, using another employee’s account or
password, gaining unauthorized access to resources or other systems or
posting anonymous messages unless otherwise authorized by the
Company.
11. Forgery or unauthorized alteration of electronic communications.
12. Transmitting any confidential, proprietary or trade secret information
of the Company, including, without limitation information concerning
the Company’s finances business operations and marketing without the
prior written consent of the General Counsel. Accessing for other than
Company business, any confidential, proprietary or trade secrets of
other persons or entities,
Duty to Report Violations
Employees who become aware of violations of this policy must report such
violations to their supervisor. An employee's failure to report a violation
may result in disciplinary action, up to and including discharge
Electronic Etiquette
Like all communications, there are some simple but important rules to
ensuing electronic communication systems. ‘These rules are based upon
common sense and courtesy. Included as attachment A to this policy are
rules and guidelines you should follow. They will be updated from time to
time
No Waiver
Any failure by the Company to discipline an employee for violations of this
policy shall not constitute a waiver of its right to impose discipline for
subsequent violations.
Access, Monitoring and Surveillance
By accepting employment with the Company, employees consent without
prior notification, to the Company (a) monitoring, printing, copying and/or
deleting of any voice mail message, e-mail message or other electronic data
prepared by the employee and (b) the Company's use of any such
voice-mail, e-mail or other electronic data as the Company deemsappropriate. Employees acknowledge that the Company’s ability and
freedom to monitor, delete and otherwise take action with respect to
employee voice-mails, e-mails, Internet usage and other electronic data
stored on Company equipment is necessary in order for the Company to
protect itself, its business and its employees.
Date: 03/20/99
Theodore M. Prociv,
President & CEO
ACKNOWLEDGMENT
Ihave carefully reviewed the Electronic Communication Policy dated March 20,1999. 1
agreed to abide by this policy at all times that I act on behalf of the Company, or
otherwise use Company Resources. I understand that a violation of this policy will
subject me to disciplinary action, up to and including termination, and may also subject
me to litigation, if and when appropriate.
J
Signature
Dlovan Abd Al-hnan
Print Name
12/27/2022
Date
ATTACHMENT A
ELECTRONIC COMMUNICATIONS ETIQUETTE
1. Check e-mail daily and remain within disk space limitations,
2. Delete unwanted or unneeded messages immediately since they take up disk
storage. Keep remaining messages to the minimum.Review and delete saved messages and other documents regularly.
Keep system stored files to a minimum, Personal files should be downloaded to
your personal computer’s hard drive or to a diskette or zip drive. Project files
should be stored on the network or archived.
Avoid
ing your user id or password to another person,
Never assume your electronic communications are private nor can they be read
only by yourself. Never send or store something that you would be embarrassed
having your mother read, be seen on the evening news or explaining to a grand
jury.
Keep paragraphs and messages short and to the point.
Focus on one subject per message, always include a pertinent subject title for all
communications and documents.
9. Include your name (like a signature) at the bottom of a message or
communication.
10. Capitalize words normally, or to highlight an important point. Capitalizing whole
words that are not titles or normal usage is SHOUTING! Remember, it is
impolite to yell.
11. *Asterisks* surrounding a word can be used to make a stronger point.
12. Never send chain letters through electronic communication systems.
13. Use discretion and common sense when forwarding e-mail or communications to
group addresses and distribution lists.
14. Do not repeat the entire message or communication when you are replying when
it is not necessary.
15. Be polite. Use taste, judgement and common sense when communicating with
others. Always use appropriate language.
16. Do not use the electronic communications systems in any way that would disrupt
their use by other users.
With thanks to The Net; User Guidelines and Netiquette by Arlene Rinaldi and Florida
Atlantic University.