COMPUTER USE POLICY

SECTION ONE.
PURPOSE A. To better serve our customers and provide our employees with the best tools to do their jobs, The Family Center of Gap makes available to our workforce access to one or more forms of electronic media and services, including computers, e-mail, telephones, voicemail, fax machines, external electronic bulletin boards, wire services, online services, intranet, Internet and the World Wide Web. B. The Family Center of Gap encourages the use of these media and associated services because they can make communication more efficient and effective and because they are valuable sources of information about vendors, customers, technology, and new products and services. However, all employees and everyone connected with the organization should remember that electronic media and services provided by the company are company property and their purpose is to facilitate and support company business. All computer users have the responsibility to use these resources in a professional, ethical, and lawful manner. C. To ensure that all employees are responsible, the following guidelines have been established for using e-mail and the Internet. No policy can lay down rules to cover every possible situation. Instead, this policy is designed to express The Family Center of Gap philosophy and set forth general principles when using electronic media and services.

SECTION TWO.
PROHIBITED COMMUNICATIONS Electronic media cannot be used for knowingly transmitting, retrieving, or storing any communication that is: 1. Discriminatory or harassing; 2. Derogatory to any individual or group; 3. Obscene, sexually explicit or pornographic; 4. Defamatory or threatening; 5. In violation of any license governing the use of software; or 6. Engaged in for any purpose that is illegal or contrary to The Family Center of Gap policy or business interests.

SECTION THREE.
PERSONAL USE The computers, electronic media and services provided by The Family Center of Gap are primarily for business use to assist employees in the performance of their jobs. Limited, occasional, or incidental use of electronic media (sending or receiving) for personal, non-business purposes is understandable and acceptable, and all such use should be done in a manner that does not negatively affect the systems' use for their business purposes. However, employees are expected to demonstrate a sense of responsibility and not abuse this privilege.

http://community.spiceworks.com/education/projects/Template_-_Computer_Use_Policy Page 1 of 3

employees are prohibited from engaging in. if they have sensitive information to transmit. testing. ACCESS TO EMPLOYEE COMMUNICATIONS A. at its discretion. to review any employee's electronic files and messages to the extent necessary to ensure electronic media and services are being used in compliance with the law.spiceworks. Using other people's log-ins or passwords.SECTION FOUR. 3. voicemail. and similar electronic media is not reviewed by the company. telephones. Accordingly. C. Detecting patterns of use that indicate employees are violating company policies or engaging in illegal activity. Employees should contact the system administrator if they have any questions. Only software registered and/or approved through The Family Center of Gap may be downloaded. this policy and other company policies. No e-mail or other electronic communications can be sent that attempt to hide the identity of the sender or represent the sender as someone else. sites accessed. recording telephone calls. and 4. http://community. SECTION FIVE.com/education/projects/Template_-_Computer_Use_Policy Page 2 of 3 . electronic information created and/or communicated by an employee using e-mail. 2. Resource allocation. 5. unauthorized downloading of any unauthorized software is strictly prohibited. and time at which calls are made. they should use other means. utility programs. Optimum technical management of information resources. Other training purposes B. B. the following conditions should be noted: The Family Center of Gap does routinely gather logs for most electronic activities or monitor employee communications directly. The Family Center of Gap reserves the right. call length. or attempting to engage in: 1. telephone numbers dialed. However. Breaching. Employees should not assume electronic communications are completely private. 3. for the following purposes: 1. Monitoring or intercepting the files or electronic communications of other employees or third parties. e. spreadsheets. but not limited to instant message and remote control programs. Except in cases in which explicit authorization has been granted by company management. SECURITY/APPROPRIATE USE A. Cost analysis. Employees must respect the confidentiality of other individuals' electronic communications. SOFTWARE To prevent computer viruses from being transmitted through the company's computer system. Internet and bulletin board system access. or monitoring computer or network security measures. Generally.g. 2. Hacking or obtaining access to systems or accounts they are not authorized to use. Including. SECTION SIX. word processing. and 4.

Internet mailing lists. For instance. modify or forward copyrighted materials except as permitted by the copyright owner. and agree to comply with the foregoing policies. understand. Anyone obtaining electronic access to other companies' or individuals' materials must respect all copyrights and cannot copy. including possible termination of employment. I understand that I have no expectation of privacy when I use any of the telecommunication equipment or services. SECTION SEVEN. and online services—are statements identifiable and attributable to The Family Center of Gap. The Family Center of Gap recognizes that participation in some forums might be important to the performance of an employee's job. Electronic media and services should not be used in a manner that is likely to cause network congestion or significantly hamper the ability of other people to access and use the system. legal action. SECTION NINE. an employee might find the answer to a technical problem by consulting members of a news group devoted to the technical area. D. legal action and criminal liability. Furthermore. ENCRYPTION Employees can use encryption software supplied to them by the systems administrator for purposes of safeguarding sensitive or confidential business information supervisor with a sealed hard copy record (to be retained in a secure location) of all of the passwords and/or encryption keys necessary to access the files. and conditions governing the use of the Company's computer and telecommunications equipment and services. EMPLOYEE AGREEMENT ON USE OF E-MAIL AND THE INTERNET I have read. Employees should remember that any messages or information sent on company-provided facilities to one or more individuals via an electronic network—for example. I understand that this policy can be amended at any time. VIOLATIONS Any employee who abuses the privilege of their access to e-mail or the Internet in violation of this policy will be subject to corrective action.C. retrieve. bulletin boards. Dated: _________. I further understand that my use of the e-mail and Internet may reflect on the image of The Family Center of Gap to our customers. and criminal liability. [Signature of employee]________________________________ [Printed name of employee]________________________________ http://community. PARTICIPATION IN ONLINE FORUMS A.spiceworks. I am aware that violations of this guideline on appropriate use of the e-mail and Internet systems may subject me to disciplinary action. SECTION EIGHT.com/education/projects/Template_-_Computer_Use_Policy Page 3 of 3 . competitors and suppliers and that I have responsibility to maintain a positive representation of the company. SECTION TEN. rules. B. including termination from employment.

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

47..0.99088902.947190.-0/434.36:089438  $% $  $&#%.0/974:%0.20390741./0/ 254008 84:/./23897.439.5574..52.

94149073/..70349..943841490702540084797/5.. 05.3474-9..9..70574-90/174203.425.:9470/94:80   &83490750450 84 38475.:7920.:947.8847/8.!!# !#%&$  2540082:8970850.33.8:708    40 2.02039 0254008.990..3/   70..9743.32.8 00.0593.4:39890.390/-.03   439473473907.422:3.9438..0593901084700.9743.3 90893 472439473..88420430080   ½ $$n¯¯° ¾½n ¾ n¯$ nf°$½© n¾$@ ¯½f % %.9438 .7908   ..8-0037..422:3.47490700.9.943.425:907473094780./:.99025939403.422:3.99025994/090/03994190803/0747705708039 90803/07.3.0889488902847..431/039.8083.3-080399.9743.33 47 ...

¯½ %D¾ %9n 9f– € .

20/..3/807..-:8308831472..2.9743.3:8003.430894347831..82:8970850.088944907.47/ 94-0709.:70 4..45 70970.943 41..708:550/94902-90889028. 0.9438:507.45798.80.30/3.3349 ...80.:8030947.4570.33079.45790/2.3/:809088902    34304-9.088...250790.047.9743.759438419.98094.9471475:754808418..9.80.308 473/.7/3 80389.10:.8847/8.059.39 .3/.7/.907./23897.85072990/-90.45794307  $% $'  #!%  254008./:.7/.0884:/349-0:80/3.907.425.3300.-94149075045094..0/.41905..8479.0 24/147147.3/.8 2.431/039.

3 8.943.08 :3/0789.9.574-02-.250 39073092.557457.422:3.3/9.20390741..084731472.073390:804190 425.70.759430830.3 :79072470 :3/0789.90894430472470 3/.0.5489.3/.9.943806:52039.9434157.088940 2./0/1.070.92:8041900 2.92094/8.08 7:08 .5    %0.94384198:/03043 .3.20390741.39..95.943 3. 03:80.90/********* $3...43089..380794.088.43/94384.:/390723.30947 1470.997-:9..9434102542039 0.-08:-0.3/ .5..3..041..3/..  $%   ' % $ 30254004.9743.08 .79.7.943 902.9:7041025400(******************************** !7390/3.34190900.7010.9.4..9..723.42599014704354.08890108  $% %  !#%!%   #&$  25400884:/70202-079.3/807.3/39073098890282.4703.3/8:55078.203/0/.9431742 02542039 0.3994905071472.94338420147:2829-025479.041%0..70 89.90:8041900 2.70094..94306:5203947807.07085438-994 2..3 025400 84- 47389.-094%0.723.3/39073092.08 .3.4.943419854.53.3.994 .3/..4770...20390741.8.-9 1:7907:3/0789.425099478.422:3.2041025400(******************************** ½ $$n¯¯° ¾½n ¾ n¯$ nf°$½© n¾$@ ¯½f % %.9.3/4330807.9.570..-9  $% %  ! #% &$  %%#% .90.425:907.7/8 .-0.943803943....99854.3 574../:.438:93202-07841.709..943 3.490/949090.9434190.9020398/0391.32088.3/.3898 -:093-4.3 920   .425..3-0.5944:7..../ :3/0789.:/35488-090723.3/9.8:-0.425..034050.30254002913/90.:8942078 .794.479039073093.3/900.3.3/9.3/9.3/.2.-:8089057..300.0 ..943 .0041907..9.0705708039..308 74:5/0.

¯½ %D¾ %9n 9f– € .

Sign up to vote on this title
UsefulNot useful

Master Your Semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master Your Semester with a Special Offer from Scribd & The New York Times

Cancel anytime.