Sample Staff Policies for Computer Use

Preamble

The use of computer equipment and access to the internet is a privilege. With that privilege comes a responsibility for the ethical and appropriate use of these resources. The following details this more fully.

Contexts for Use

Computer equipment, access to the organization’s network and an internet connection will be used in the performance of your job for legitimate business. All users have a responsibility to use these computer resources and the Internet in a professional, lawful and ethical manner. Occasional limited appropriate personal use of the computer is permitted if such use does not interfere with the user’s or any other employee’s job performance; have an undue effect on the computer or organization network’s performance; or violate any other policies, provisions, guidelines or standards of this or any other agreement of the organization.

Inappropriate Activities

The following list is not exhaustive but gives examples of inappropriate computer-based activities:

• Using tech resources to create, view or share offensive, pornographic, discriminatory or demeaning media

• Using technology resources without appropriate permission or access

• Intentionally damaging, degrading or wasting any technology resources

• Using technology resources to harass, insult or attack others

• Invading a person’s privacy by tampering with or destroying his/her work (passwords, accounts, folders, files)

• Sharing or copying another’s work without his/her consent

• Violating copyright laws or other legal contracts

• Playing of PC games during work time

• Installing unauthorized software on organization’s equipment

Consequences

Failure to comply with these policies will be taken seriously. Any inappropriate use of the computer or the internet technologies is grounds for disciplinary action and/or termination.

Disclaimer

The organization recognizes that it is difficult to avoid at least some contact with objectionable material while using the internet. Even innocuous search requests may lead to sites with highly offensive content. Additionally, having an e-mail address on the internet may lead to receipt of unsolicited e-mail containing offensive content. Users accessing the internet do so at their own risk; the organization is not responsible for material viewed or downloaded by users from the internet. Employees will not be held accountable for inappropriate material sent to them or inadvertently viewed. All inappropriate material received should be deleted immediately.

Lack of Privacy/Organization’s Rights

The user expressly waives any right of privacy in anything they create, store, send or receive using the organization’s computer equipment or internet access. User consents to allow the organization’s personnel access to and review of all materials created, stored, sent or received by user through any organization network or internet connection. The organization has the right to monitor and log any and all aspects of its computer system including, but not limited to, monitoring internet sites visited by users, monitoring chat and newsgroups, monitoring file downloads, and all communications sent and received by users. Employees should have no expectation of privacy in anything they create, store, send or receive using the organization’s computer equipment. The organization has the right to utilize software that makes it possible to identify and block access to internet sites containing sexually explicit or other material deemed inappropriate in the workplace.

Personal Accountability

It is recommended that all users consider installing an accountability program like Covenant Eyes or X3Watch. The organization grants permission to install such software on all equipment with internet access. For an employee who has been cited for inappropriate internet use, the organization may require that such software be installed.

Faith (for Content):