SlideShare a Scribd company logo
1 of 2
Download to read offline
Memorandum: POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Policies to Be Adhered
Equipment and Fair internet usage Policy.
 Company employees are expected to use the Internet responsibly and productively. Internet access is limited to
work-related activities ONLY and personal use is not permitted.
 Job-related activities include research/client work/communication, business requirements and tasks that are
accomplished through fair means of using internet.
 The equipment provided to employees such as Laptops/Flash Drives/Headgears/USB
mouse/Keyboards/Chargers ETC. are at all times company property and should be dealt with caution.
 NO company property such as Laptops/screens/mouse/headgears Android devices etc. should be taken with an
employee without a proper approval from an authorized personnel for any personal use.
(Contact the network admin.)
 Any employee looking to take any company equipment home to work, should fill out a request form which can
be obtained through your network admin.(Subject To Approval).
 Any employee found guilty of miss-using the above mentioned equipment, may result in company establishing a
disciplinary action against the employee including (Covering costs of the IT Equipment & a written
warning).
 Internet browsing and data accessed, is being monitored and any employee spotted of doing non-work related
activities will be dealt strictly, with consequences bearing up to dismissal or vice/versa.
 Any employee found using Emails/Skype/social networking sites etc. containing offensive or abusive material
will be strictly dealt with.
 Laptop/Desktop should be clear of any sort of games. No games should be installed on any work related station.
 All sites and downloads are monitored and can be blocked by the company if they are deemed harmful and not
productive to business.
 The installation of random, non-work-related softwares will be deleted and should not be installed as they are
BARRED.
 Any employee’s system can be accessed remotely to see everything is in accordance and a spot check on any
employee can be conducted to ensure compliance in accordance to the company’s INTERNET &
TECHNOLOGY USE POLICY.
 A daily data traffic report of Internet (it will contain each and everything about which sites and which data was
downloaded) will be generated and will be monitored to ensure compliance and any employee found in breach of
this policy will be strictly dealt with.
 Any employee found using company property to perpetrate any form of fraud, or disclosing someone else's
password without authorization will be immediately TERMINATED.
 Any employee found hacking, sending or posting information that is defamatory to the company, its
products/services, colleagues and/or Clients will be dealt accordingly.
 Any employee found guilty of introducing/installing/distributing malicious software on the company network
and/or jeopardizing the security of the organization's electronic communications systems will face serious
consequences.
 At any point, no employee should remove any technical equipment by him/herself, an authorized personal such
as a Network Admin should be consulted immediately.
 Any employee unsure about constituted Internet usage & policy should immediately consult Network
Administrator Manager or Human Resources for further guidance and clarification.
Standard Operating Procedures
 Browser History /Cache should be cleared periodically (Weekly/Monthly) ADVISABLE.
 All FTP Uploads/Downloads should be intimated to the Network Admin in advance, as sometimes multiple
FTP downloads affect the speed of the internet.
 Work stations should be shut down properly at the shift end and the laptop chargers should be unplugged to
ensure compliance and smooth running of the equipment.
 Non-Work related applications should not be installed as they are considered a breach of company’s IT
Policy.
 DON’T save any of your Important Data on your Desktop: because if window is corrupt, the data saved on
the desktop cannot be recovered
 DO NOT mention any credit /links/clients/Projects/ work related details etc. on your personal portfolio,
that you have worked upon as an iPlex Pvt. Ltd. employee, this is strictly FORBIDDEN and the work
completed at iPlex Pvt. Ltd. is solely company property not to be DISCLOSED.
 The above SOP maybe periodically changed and implemented.
User compliance
I understand and will abide by this. I further understand that should I commit any violation of this policy,
my access privileges may be revoked, disciplinary action and/or appropriate legal action may be taken in
accordance.
_________________ ______________
Employee signature Date

More Related Content

What's hot

Common Mistakes in Police Reports
Common Mistakes in Police ReportsCommon Mistakes in Police Reports
Common Mistakes in Police ReportsJean Reynolds
 
Reference letter writing
Reference letter writingReference letter writing
Reference letter writingMónica Osorio
 
Lesson plan 2.1 police ethics
Lesson plan 2.1 police ethicsLesson plan 2.1 police ethics
Lesson plan 2.1 police ethicsJoy Ordono
 
03 - Managing Director Recommendation Letter
03 - Managing Director Recommendation Letter03 - Managing Director Recommendation Letter
03 - Managing Director Recommendation LetterMohamed Yasser
 
Quotation Letter for 2 bedroom Pakubuwono House apt
Quotation Letter for 2 bedroom Pakubuwono House aptQuotation Letter for 2 bedroom Pakubuwono House apt
Quotation Letter for 2 bedroom Pakubuwono House aptAli Bader
 
Compilation of previous board examination questions
Compilation of previous board examination questionsCompilation of previous board examination questions
Compilation of previous board examination questionsRhem Rick Corpuz
 
Recommendation Letter 1
Recommendation Letter 1Recommendation Letter 1
Recommendation Letter 1Jasraj Singh
 
Memorandum of agreement
Memorandum of agreementMemorandum of agreement
Memorandum of agreementruelcdogma
 
INTEROGATION SCRIPT.docx
INTEROGATION SCRIPT.docxINTEROGATION SCRIPT.docx
INTEROGATION SCRIPT.docxjimboygamer
 
Lecture pnp operations manual presentation
Lecture   pnp operations manual presentationLecture   pnp operations manual presentation
Lecture pnp operations manual presentationMcypp Ncmf
 
High School transcript
High School transcriptHigh School transcript
High School transcriptAuden Fortier
 
Project based employment contract
Project based employment contractProject based employment contract
Project based employment contractShaun Menon
 
Letter of recommendation HSE
Letter of recommendation HSELetter of recommendation HSE
Letter of recommendation HSELuis Mota
 

What's hot (20)

Common Mistakes in Police Reports
Common Mistakes in Police ReportsCommon Mistakes in Police Reports
Common Mistakes in Police Reports
 
Reference letter writing
Reference letter writingReference letter writing
Reference letter writing
 
Employee leave
Employee leaveEmployee leave
Employee leave
 
Lesson plan 2.1 police ethics
Lesson plan 2.1 police ethicsLesson plan 2.1 police ethics
Lesson plan 2.1 police ethics
 
03 - Managing Director Recommendation Letter
03 - Managing Director Recommendation Letter03 - Managing Director Recommendation Letter
03 - Managing Director Recommendation Letter
 
Quotation Letter for 2 bedroom Pakubuwono House apt
Quotation Letter for 2 bedroom Pakubuwono House aptQuotation Letter for 2 bedroom Pakubuwono House apt
Quotation Letter for 2 bedroom Pakubuwono House apt
 
dokumen.tips_abc-baton-manual-2010pdf.pdf
dokumen.tips_abc-baton-manual-2010pdf.pdfdokumen.tips_abc-baton-manual-2010pdf.pdf
dokumen.tips_abc-baton-manual-2010pdf.pdf
 
BPAT Training Program of Instruction
BPAT Training Program of InstructionBPAT Training Program of Instruction
BPAT Training Program of Instruction
 
Compilation of previous board examination questions
Compilation of previous board examination questionsCompilation of previous board examination questions
Compilation of previous board examination questions
 
Recommendation Letter 1
Recommendation Letter 1Recommendation Letter 1
Recommendation Letter 1
 
Memorandum of agreement
Memorandum of agreementMemorandum of agreement
Memorandum of agreement
 
Casual Employees
Casual EmployeesCasual Employees
Casual Employees
 
Preliminary Investigation
Preliminary InvestigationPreliminary Investigation
Preliminary Investigation
 
INTEROGATION SCRIPT.docx
INTEROGATION SCRIPT.docxINTEROGATION SCRIPT.docx
INTEROGATION SCRIPT.docx
 
Lecture pnp operations manual presentation
Lecture   pnp operations manual presentationLecture   pnp operations manual presentation
Lecture pnp operations manual presentation
 
High School transcript
High School transcriptHigh School transcript
High School transcript
 
PNP MC 2015-009 - REVITALIZED BARANGAY PEACEKEEPING OPERATIONS
PNP MC 2015-009 - REVITALIZED BARANGAY PEACEKEEPING OPERATIONSPNP MC 2015-009 - REVITALIZED BARANGAY PEACEKEEPING OPERATIONS
PNP MC 2015-009 - REVITALIZED BARANGAY PEACEKEEPING OPERATIONS
 
Improving Police/Community Relations
Improving Police/Community RelationsImproving Police/Community Relations
Improving Police/Community Relations
 
Project based employment contract
Project based employment contractProject based employment contract
Project based employment contract
 
Letter of recommendation HSE
Letter of recommendation HSELetter of recommendation HSE
Letter of recommendation HSE
 

Viewers also liked

policies and prosedures For JK Air Finished
policies and prosedures For JK Air Finishedpolicies and prosedures For JK Air Finished
policies and prosedures For JK Air FinishedLevi Williams
 
Google’s Internal Memo Leaked "JavaScript is Flawed, Won't Work, and Can't Be...
Google’s Internal Memo Leaked "JavaScript is Flawed, Won't Work, and Can't Be...Google’s Internal Memo Leaked "JavaScript is Flawed, Won't Work, and Can't Be...
Google’s Internal Memo Leaked "JavaScript is Flawed, Won't Work, and Can't Be...Stephane Beladaci
 
Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles
Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles
Dobusch Leonhard
 
Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use Sue Barrett
 
Employees and Internet Use - Legal Aspects
Employees and Internet Use - Legal Aspects Employees and Internet Use - Legal Aspects
Employees and Internet Use - Legal Aspects Darius Whelan
 
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...Darius Whelan
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policygfair3
 

Viewers also liked (9)

policies and prosedures For JK Air Finished
policies and prosedures For JK Air Finishedpolicies and prosedures For JK Air Finished
policies and prosedures For JK Air Finished
 
Google’s Internal Memo Leaked "JavaScript is Flawed, Won't Work, and Can't Be...
Google’s Internal Memo Leaked "JavaScript is Flawed, Won't Work, and Can't Be...Google’s Internal Memo Leaked "JavaScript is Flawed, Won't Work, and Can't Be...
Google’s Internal Memo Leaked "JavaScript is Flawed, Won't Work, and Can't Be...
 
Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles
Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles

 
Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use Intellectual Property, Copyright and Fair Use
Intellectual Property, Copyright and Fair Use
 
Employees and Internet Use - Legal Aspects
Employees and Internet Use - Legal Aspects Employees and Internet Use - Legal Aspects
Employees and Internet Use - Legal Aspects
 
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Tb writing book
Tb writing bookTb writing book
Tb writing book
 
Memorandos
MemorandosMemorandos
Memorandos
 

Similar to Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE

Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)Wissam Abdel Baki
 
Checklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersChecklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersPeter Hagen
 
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNPOLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNLuis Antonio Bustillos López
 
Level 3 lsr tech solutions employee access iphone and ipad
Level 3 lsr tech solutions employee access iphone and ipadLevel 3 lsr tech solutions employee access iphone and ipad
Level 3 lsr tech solutions employee access iphone and ipadjoeblow1234
 
The Realities of Implementing a Remote Workforce
The Realities of Implementing a Remote WorkforceThe Realities of Implementing a Remote Workforce
The Realities of Implementing a Remote WorkforceRichard Hatheway
 
Consensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicConsensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicAlleneMcclendon878
 
Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access policARIV4
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)scobycakau
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template Demand Metric
 
Schooley mitchell mobile device policy white paper 2016
Schooley mitchell mobile device policy white paper 2016Schooley mitchell mobile device policy white paper 2016
Schooley mitchell mobile device policy white paper 2016Jerry Pollio
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Vijay Dalmia
 
Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docx
Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docxRunning head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docx
Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docxjeanettehully
 
It policy (ver 1.0)
It policy (ver  1.0)It policy (ver  1.0)
It policy (ver 1.0)sentmery5
 
ISSP on Fair Use of Organizational Technology for CGT
ISSP on Fair Use of Organizational Technology for CGTISSP on Fair Use of Organizational Technology for CGT
ISSP on Fair Use of Organizational Technology for CGTcheyennedaisy
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Matthew Charles
 
User responsibilities policy
User responsibilities policyUser responsibilities policy
User responsibilities policyJigyanshu Jangid
 

Similar to Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE (20)

IT Policy
IT Policy IT Policy
IT Policy
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
 
Checklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workersChecklist to reduce security risk for your remote workers
Checklist to reduce security risk for your remote workers
 
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓNPOLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
POLITICA DE USO ACEPTABLE DE ACTIVOS DE INFORMACIÓN
 
Level 3 lsr tech solutions employee access iphone and ipad
Level 3 lsr tech solutions employee access iphone and ipadLevel 3 lsr tech solutions employee access iphone and ipad
Level 3 lsr tech solutions employee access iphone and ipad
 
The Realities of Implementing a Remote Workforce
The Realities of Implementing a Remote WorkforceThe Realities of Implementing a Remote Workforce
The Realities of Implementing a Remote Workforce
 
Consensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicConsensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access Polic
 
Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access polic
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
Schooley mitchell mobile device policy white paper 2016
Schooley mitchell mobile device policy white paper 2016Schooley mitchell mobile device policy white paper 2016
Schooley mitchell mobile device policy white paper 2016
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT network
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
 
Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docx
Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docxRunning head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docx
Running head THE NETWORK INFASTRUCTURE OF JETS INC1THE NETWORK.docx
 
code of conduct
code of conductcode of conduct
code of conduct
 
It policy (ver 1.0)
It policy (ver  1.0)It policy (ver  1.0)
It policy (ver 1.0)
 
ISSP on Fair Use of Organizational Technology for CGT
ISSP on Fair Use of Organizational Technology for CGTISSP on Fair Use of Organizational Technology for CGT
ISSP on Fair Use of Organizational Technology for CGT
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)
 
Computer Basics in the Work Place
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
 
User responsibilities policy
User responsibilities policyUser responsibilities policy
User responsibilities policy
 

Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE

  • 1. Memorandum: POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE Policies to Be Adhered Equipment and Fair internet usage Policy.  Company employees are expected to use the Internet responsibly and productively. Internet access is limited to work-related activities ONLY and personal use is not permitted.  Job-related activities include research/client work/communication, business requirements and tasks that are accomplished through fair means of using internet.  The equipment provided to employees such as Laptops/Flash Drives/Headgears/USB mouse/Keyboards/Chargers ETC. are at all times company property and should be dealt with caution.  NO company property such as Laptops/screens/mouse/headgears Android devices etc. should be taken with an employee without a proper approval from an authorized personnel for any personal use. (Contact the network admin.)  Any employee looking to take any company equipment home to work, should fill out a request form which can be obtained through your network admin.(Subject To Approval).  Any employee found guilty of miss-using the above mentioned equipment, may result in company establishing a disciplinary action against the employee including (Covering costs of the IT Equipment & a written warning).  Internet browsing and data accessed, is being monitored and any employee spotted of doing non-work related activities will be dealt strictly, with consequences bearing up to dismissal or vice/versa.  Any employee found using Emails/Skype/social networking sites etc. containing offensive or abusive material will be strictly dealt with.  Laptop/Desktop should be clear of any sort of games. No games should be installed on any work related station.  All sites and downloads are monitored and can be blocked by the company if they are deemed harmful and not productive to business.  The installation of random, non-work-related softwares will be deleted and should not be installed as they are BARRED.  Any employee’s system can be accessed remotely to see everything is in accordance and a spot check on any employee can be conducted to ensure compliance in accordance to the company’s INTERNET & TECHNOLOGY USE POLICY.  A daily data traffic report of Internet (it will contain each and everything about which sites and which data was downloaded) will be generated and will be monitored to ensure compliance and any employee found in breach of this policy will be strictly dealt with.  Any employee found using company property to perpetrate any form of fraud, or disclosing someone else's password without authorization will be immediately TERMINATED.
  • 2.  Any employee found hacking, sending or posting information that is defamatory to the company, its products/services, colleagues and/or Clients will be dealt accordingly.  Any employee found guilty of introducing/installing/distributing malicious software on the company network and/or jeopardizing the security of the organization's electronic communications systems will face serious consequences.  At any point, no employee should remove any technical equipment by him/herself, an authorized personal such as a Network Admin should be consulted immediately.  Any employee unsure about constituted Internet usage & policy should immediately consult Network Administrator Manager or Human Resources for further guidance and clarification. Standard Operating Procedures  Browser History /Cache should be cleared periodically (Weekly/Monthly) ADVISABLE.  All FTP Uploads/Downloads should be intimated to the Network Admin in advance, as sometimes multiple FTP downloads affect the speed of the internet.  Work stations should be shut down properly at the shift end and the laptop chargers should be unplugged to ensure compliance and smooth running of the equipment.  Non-Work related applications should not be installed as they are considered a breach of company’s IT Policy.  DON’T save any of your Important Data on your Desktop: because if window is corrupt, the data saved on the desktop cannot be recovered  DO NOT mention any credit /links/clients/Projects/ work related details etc. on your personal portfolio, that you have worked upon as an iPlex Pvt. Ltd. employee, this is strictly FORBIDDEN and the work completed at iPlex Pvt. Ltd. is solely company property not to be DISCLOSED.  The above SOP maybe periodically changed and implemented. User compliance I understand and will abide by this. I further understand that should I commit any violation of this policy, my access privileges may be revoked, disciplinary action and/or appropriate legal action may be taken in accordance. _________________ ______________ Employee signature Date