SAMPLE Internet and E-mail Acceptable Use Policy -- Revision 6 (02-28-2015) To ensure that all employees understand their responsibilities, the following guidelines have been established for using (your name here) (company) e-mail and Internet access. Any improper usage of the Internet or e-mail jeopardizes the company’s legal standing and therefore cannot be tolerated. A. Acceptable uses of company e-mail and Internet access The company provides Internet and e-mail access for business usage. Every staff member has the responsibility to maintain and enhance the company’s public image and to use company e-mail and access to the Internet in a responsible and productive manner that reflects well on the company. The company recognizes that there will be occasional personal use on lunch breaks and during nonworking hours (with approval of management), but this shall not be excessive or unreasonable. B. Unacceptable uses of company e-mail and Internet access The company e-mail and Internet access may not be used for transmitting, retrieving, or storage of any communications of a discriminatory or harassing nature or materials that are obscene or “X-rated.” Harassment of any kind is prohibited. No messages with derogatory or inflammatory remarks about an individual’s race, age, disability, religion, national origin, physical attributes, or sexual preference shall be transmitted. No excessively abuse, profane, or offensive language is to be transmitted through the company’s e-mail or Internet system. The sending or forwarding of chain letters or mass unsolicited e-mail messages (SPAM) is strictly prohibited. Electronic media may not be used for any purpose that is illegal or against company policy. C. Communications Each employee is responsible for the content of all text, audio, video, or images that he or she places or sends over the company’s e-mail and Internet system. No e-mail or other electronic communications may be sent that hides the identity of the sender or represents the sender as someone else. All messages communicated on the company’s e-mail and Internet system should contain the employee’s name. Any messages or information sent by an employee to another individual outside the company via an electronic network (e.g., e-mail, online service, or Internet) are statements that reflect on the company. While some users include personal “disclaimers” in electronic messages, there is still a connection to the company, and the statements may legally be tied to the company. Therefore, the company requires that all communications sent by employees via the company’s e-mail and Internet system complies with all company policies and do not disclose any confidential or proprietary information. E-mails attachments that contain confidential or protected information such as medical records, credit card numbers, social security numbers, etc. must be encrypted using WinZip 11 or higher to the AE-1 or AE-2 (AES) standard. All protected information must be included in an encrypted file attachment and may not be included in plaintext within the e-mail. Encryption/decryption keys must be shared using a method other than e-mail such as voice or fax. D. Software To prevent computer viruses from being transmitted through the company’s e-mail and Internet system, there will be no unauthorized downloading of any unauthorized software. All software downloaded must be registered to the company. Unauthorized software is subject to immediate removal without notification. A list of authorized and supported software is available upon request from the Information Technology Department. The Information Technology Department may take actions against specific users that violate this policy. Actions may include, but are not limited to, revocation of the user’s username and password; limiting the users access to computer resources; limiting the users access to configuration options such as screen savers and other system settings. Employees should contact their supervisor or the Information Technology Department if they have any questions. E. Copyright Issues Employees may not transmit copyrighted materials belonging to entities other than the company using the company’s e-mail and Internet systems. Note that non-adherence to this policy puts the company in serious legal jeopardy and opens the company up to significant lawsuits and public embarrassment. All employees obtaining access to other companies’ or individuals’ materials must respect all copyrights and may not copy, retrieve, modify, or forward copyrighted materials, except with permission. Failure to observe copyright or license agreements may result in disciplinary action up to and including termination. If an employee has questions about any of these legal issues, they should contact their supervisor or the Information Technology Department before proceeding. SAMPLE F. Security The company reserves the right to routinely monitor usage patterns in its e-mail, Internet communications, and file storage systems (I.e. Common, Home Drives, etc.) The reasons for this monitoring include, but are not limited to, cost analysis, security, bandwidth allocation, and the general management of the company’s resources. All messages created, sent, or retrieved over the company’s e-mail and Internet are the property of the company and should be considered public information. Despite this disclaimer, the company’s intention is to monitor the overall patterns of usage and not the content of the individual communications. Notwithstanding previous comments regarding the company’s current intention not to monitor content, the company reserves the right to access and monitor the content of all messages and files on the company’s e-mail and Internet system at any time, with or without notice. Employees should not assume electronic communications are totally private and should transmit highly confidential data in other ways. Users may not share their account with others. Your user account is for your use only and is granted for the sole purpose of job performance. Disclosure of your password to others is expressly prohibited. If you feel that someone else may be using your account, please contact your supervisor or the Information Technology Department immediately. You may be given special usernames and passwords for the purposed of accessing special resources such as the Internet, vendor websites, and other controller resources. You may not share or otherwise disclose the username and password for these resources. G. Confidentiality The company’s information is one of its most valuable assets. All agents representing the company must safeguard this asset. All company information including paper, electronic, or any other medium is the property of the company, it’s specifically designated partners, and it’s affiliates. All employees, contract employees, interns, or other agents of the company having access to information pertinent to customers, employees, or corporate business of a confidential nature are prohibited from discussing or revealing such information in an unauthorized manner. Employees may not view customer records unless they have business related reason for doing so. Any breach of confidentiality represents a failure to meet the professional and ethical standards expected of all employees. Furthermore, disclosure of customer records without consent may be a violation of Federal Law. Violation of this agreement may result in disciplinary action including but not limited to immediate discharge with the potential of criminal or civil prosecution. H. Violations Any employee who abuses the privilege of company-facilitated access to e-mail or the Internet, or violates any of the rules relating to the use of said systems, will be subject to corrective action up to and including termination. If necessary, the company also reserves the right to advise appropriate legal officials of any illegal violations. I. Acceptance The use of your company issued username and password or e-mail account constitutes your acceptance of these guidelines and all related company policies. SAMPLE E-mail Etiquette Policy - Revision 4 (03-02-2015) As the use of e-mail has not only replaced paper-based communication but has also become a substitute for having a conversation, the proper use of e-mail etiquette has become increasingly important. Communication received in an e-mail does not easily convey the mood and emotions of the communicator. Most messages come across harsher than what was intended. The following are useful guidelines for communicating by e-mail. A. Be brief Your e-mail messages should be concise and to the point. It is helpful to think of your e-mail as a telephone conversation, except you are typing instead of speaking. You should also make your main point as quickly as possible. Many software programs used for reading e-mail allow for a preview mode, where only the first couple of sentences are displayed. Many people receive hundreds of e-mails a day and use this preview mode to determine which e-mails they will read completely. B. Use the subject line wisely An accurate subject line is also helpful for determining which e-mails merit closer attention by those who receive large volumes of e-mail, but be careful not to earn a reputation for over-hyping your message in the subject line; your really important messages may not get read. C. Use grammar and punctuation correctly Poor grammar and punctuation reflect poorly on the sender. Don’t overuse exclamation points in an attempt to emphasize the importance of what you are saying. If something is important it should be reflected in your text, not in your punctuation. D. Use special formatting sparingly Avoid the use of fancy formatting within your message. What might look great using your e-mail client software may look like gibberish to the e-mail client of the recipient. Stick to commonly available fonts, and realize that the spacing as displayed by the recipient may be different from that from which the message was sent, especially when displaying columnar data. E. Abbreviations Abbreviation usage is quite rampant with e-mail and often leads to confusion, as not everyone may understand the abbreviations. Avoid using abbreviations that you would not normally use in a paper-based communication. F. Smiles or emoticons Smiles or emoticons (emotional icons) are used to compensate for the inability of written communication to express the emotions, facial expressions, and gestures we would see in a verbal or face-to-face communication. Emoticons can be useful in avoiding misunderstandings of the writer’s intentions. Most emoticons are designed to resemble what a person’s face would look like if rotated 90 degrees counterclockwise. The most commonly used emoticon is the smiley face :) or :-), which resembles a person smiling. Emoticons are typically found at the end of sentences and will usually refer back to the prior statement. They should be used sparingly, as their meanings are not universal. G. Salutations Each situation will be different, but in general, use what you would use in a business letter. As a common courtesy, some sort of salutation should be included with every e-mail. H. Signatures Do not rely on your e-mail address to inform the recipient who sent the e-mail. You should sign your e-mail just as you would a business letter. Include at minimum your name, and if necessary, include your title, company name, and telephone number. You may want to also include your e-mail address, because it can sometimes be difficult to locate your e-mail address within the e-mail. Avoid using quotes or images at the end of your e-mail. I. Printing e-mail Avoid printing a paper copy of e-mails you receive unless absolutely necessary. Our e-mail system allows you to create folders for storing old e-mails if you need to save a copy. Contact your supervisor or the Information Technology Department if you have questions. SAMPLE J. Privacy Remember that e-mails are not private. The company reserves the right to monitor e-mail content to ensure that the e-mail system is being used for appropriate purposes. Also, no security is 100 percent hacker-proof; someone outside the company may be able to intercept and read your e-mail. The routing of e-mail is not without errors; someone other than the intended recipient may receive your e-mail. Do not send anything by e-mail that you would not want publicly displayed. K. Other Issues Remember that all recipients may not read your e-mail immediately. While your e-mail will usually arrive moments after it is sent, this is not always the case. E-mail is not designed for immediacy; it’s designed for convenience. It is advisable to not use e-mail for anything that requires an immediate response. Avoid using e-mail to deliver bad news. You cannot answer questions when a person reads the e-mail. Using all capital letters in an e-mail is the equivalent of SHOUTING. If you receive an e-mail that causes you to have a strong negative reaction, avoid responding immediately by e-mail. Use the telephone to clear up any possible misunderstanding. When replying to an e-mail, either leave the old message as part of the new one or clearly reference what you are responding to. Do not assume the reader will know exactly what you’re talking about. SAMPLE Internet and E-mail User Agreement Employee Agreement: I have received a copy of the Internet and E-mail Acceptable Use Policy, Revision 6, dated 02/24/2015. I recognize and understand that the company’s e-mail and Internet systems are to be used only for conducting the company’s business. As a user of the company’s computer system, I understand that this Acceptable Use Policy applies to me. I have read the aforementioned document and agree to follow all policies and procedures that are set forth therein. I further agree to abide by the standards set in the document for the duration of my employment with the company. I understand that the company may monitor Internet and e-mail usage to ensure compliance with the Acceptable Use Policy. I am aware that violations of this Acceptable Use Policy may subject me to disciplinary action up to and including termination. I further understand that my communications on the Internet and e-mail reflect the company worldwide to our competitors, consumers, customers, and suppliers. Furthermore, I understand that this document and the Acceptable Use Policy can be amended at any time. _______________________________ Associates Signature _____________ Date _____________________________ Associates Printed Name _______________________________ Associates Office Location _______________________________ Signature of Manager or Supervisor For Information Technology Use Date Processed: _______________________ Home Directory Created UserID Issued: ________________________ E-mail Account Issued Default Password Assigned: _____________ User Notified that Account(s) Ready Processed By: ________________________ Notes:
© Copyright 2026 Paperzz