Personal Internet Based Email Policy

In: Computers and Technology

Submitted By jtorow99
Words 567
Pages 3
APPENDIX

Employee Handbook 2013
Personal Internet Based Email Policy

Purpose
Over the last few years the use of email has become predominant in society and most people have multiple accounds. As technology has advanced it has become easier to access personal email from anywhere, especially through the use of internet based email. These internet based email services offer great ease of access; however, they also make it easier to enable the delivery of malware and virus’s into the company infrastructure and must be used with care and awareness. The Personal Internet Based Email Policy lays out the guidelines adopted by Richman Investments in this regard.
These guidelines determine the expectations of personal conduct by Richman Investments personnel while engaging in the use of Personal Internet Based Email from Richman Investments computers and networks.

Definition
Employees will be held accountable for any malicious software, virus, or spyware downloaded or inserted onto Richman Investments computers or networks from a personal account.

Policy
Richman Investments employees who choose to access Personal Internet Based Email will be held to high professional standards. Personal Internet Based Email accounts can be a useful tool to help our employees maintain a work life balance, however, if used incorrectly or abused, can be detrimental. If there is any confusion in regards to online behavior, refer to the suggested guidelines below before accessing these accounts and in regards to downloading from these sites or sites linked in emails to these accounts.

DISYS’ Guidelines
The guidelines set forth in this Personal Internet Based Email Policy are expected to be upheld by all Richman Investments employees in any Personal Internet Based Email service, such as Yahoo mail, Hotmail, gmail. These guidelines also apply to any other not mentioned…...

Similar Documents

Internet Based Companies

...Internet based companies today are on edge of this fact paced growing industry. Trying to increase revenue along with staying ahead of technology is becoming quite the task in itself. Google and Facebook are head to head now with Google leading the entire industry in revenue. The question to now ask is what should Facebook, along with other internet based companies such as Yahoo or Twitter, do to keep up and what strategies can be put into place to do so? Overall, the typical internet advertising strategies are the same. You want to be clear you are covering all of the following: * Identify your Target Audience * Knowledge of who is paying attention to your ads * A receptive targeted audience will save time and money * Research and analyze the current customer base * Observe other competitors target markets * Consistency is KEY * Keep up with your marketing campaign/ads * Take advantage of where you are able to place ads but make sure you are consistent with the approach * Does audience know who the message is coming from? * Always be unique and focus on your strengths (Google Ad revenue surges, 2012) Through these steps, advertisers are able to promote a successful campaign ad. Now as the internet based companies who are PROMOTING their space in order for companies to advertise with them I believe you must take a somewhat different approach than the above. Currently Facebook has a specific way of ad......

Words: 1081 - Pages: 5

Internet Based Computing in Business

...ABSTRACT Internet based computing can be depicted as simply a computer that interacts with other computing devices via the Internet. (McNurlin & Sprague, 2009). In today’s scenario Internet has become "central nervous system of the world." Its global connectivity feature at low cost and being a user friendly has made e-business possible for everyone. The Internet with its information and communication power has enabled business to connect and maintain strong relations with customers and all other related parties. The Internet has transformed how many people do business and continues to grow at an astounding rate (Larry Kesslin, President, Let's Talk Business Network). Beginning of Internet Era in business Since the mid-1990s, the Internet has had a revolutionary impact on culture and commerce (Wikipedia). Existing enterprises went through stages of deployment of the Internet, most of which had minimal impact on their work. Simply put, between 1994 and 1998, managers went through a period of discovery, creating their first Web sites, populating them with information about their firms, products, and services, and providing contact information. Initially, it started with providing information about company’s products on Internet, the look and feel of which mirrored the printed brochures of the 1980’s and early 1990’s. The range of possible uses of the Internet in the business expanded all through the 1990s and the early 2000s as the technology evolved and became......

Words: 1272 - Pages: 6

Developing the Internet: Entrepreneurship and Public Policy in Comparative Perspective

...DEVELOPING THE INTERNET: ENTREPRENEURSHIP AND PUBLIC POLICY IN COMPARATIVE PERSPECTIVE* Sandra L. Suárez Department of Political Science Temple University Gladfelter Hall Philadelphia, PA 19122 (215) 204-1468 ssuarez@nimbus.temple.edu and Mauro F. Guillén The Wharton School and Department of Sociology University of Pennsylvania 2016 Steinberg Hall-Dietrich Hall Philadelphia, PA 19104-6370 215-573-6267 guillen@wharton.upenn.edu November 2000 Version * This research has been funded by Temple University (Suárez) and the Wharton eBusiness Initiative, WeBI (Guillén). 2 DEVELOPING THE INTERNET: ENTREPRENEURSHIP AND PUBLIC POLICY IN COMPARATIVE PERSPECTIVE Abstract The internet has not diffused uniformly throughout the world. Data on 142 countries indicate that, aside from the levels of economic and infrastructural development, cross-national differences have to do with whether the legal system fosters entrepreneurship, and with whether institutional and political conditions are stable, and democracy is the form of government. Competition and privatization policies in the area of telecommunications do not have consistent effects. After examining international patterns of diffusion for the world as a whole, differences between two matched pairs of countries are systematically compared: Ireland and Singapore, and Argentina and Spain. Patterns of entrepreneurship and public policy in each country are shown to have differed systematically, with distinctive......

Words: 11450 - Pages: 46

Employee Internet and Email Acceptable Use Policy

...Acceptable Use Policy Internet and Email Employee Responsibilities: The use of company-owned computing devices and networks is a privilege, instead of a right, and inappropriate use can result in revocation of such privilege. Employees must remember that their behaviors represent the actions of the company, and the respect to the rights of others and all relevant laws, regulations and contracts. Employees also must be aware of that their inappropriate uses may lead to a catastrophic results on the company and other employees. Acceptable Uses: General and authorized uses for achieving the objectives of their job description, and occasional personal communications by using email. Unacceptable Uses: For Internet Use, the following actions are prohibited: * Accessing, downloading, storing, recording sites that are offensive, obscene, defamatory, abusive or otherwise unlawful * Knowingly downloading any materials irrelevant to their work * Conducting actions irrelevant to their work, such as playing games, listening to music, watch videos, and etc. For Email Use, the following actions are prohibited: * Accessing inappropriate sites or inappropriate e-mail * Transmitting private mass mailings * Transmitting messages disclosing personal information without authorization. Implementation of Policy: The head of each department is required to file reports of each employees according to their appropriate and inappropriate uses of internet and......

Words: 298 - Pages: 2

Acceptable Internet Use Policies

...Necessity of an Acceptable Internet Use Policy for Business William E. Boyle Point Park University Abstract This paper will argue that an Acceptable Internet Use Policy, combined with effective network monitoring and policy enforcement is an essential requirement for businesses to protect business assets and resources. It discusses the potential loss to business from employee misuse of internet access and the danger from external sources. Necessity of an Acceptable Internet Use Policy for Business The internet is an integral part of today’s business resources. Organizations, large and small use the internet to improve organizational efficiencies. Businesses use the internet for everything from worldwide sales using websites, workforce collaboration using email and network data access, and for business research. In most business organizations, all types of devices, from desktop computers to cell phones and PDA’s, allow workers to access the internet and send and receive email on demand. A 2008 study by the Pew Internet & American Life Project found that 53% of Americans are employed, and 96% of these workers have some access to these tools. (Madden, M. & Jones, S., 2008). This allows workers instant access to websites, email and instant messages, but uncontrolled access exposes a business organization to a great risk of financial loss. All businesses must manage this risk through the implementation of an Internet Use Policy combined with employee......

Words: 2537 - Pages: 11

E-Mail, Internet and Privacy Policies

...Running Header: E-MAIL, INTERNET, AND PRIVACY POLICIES E-Mail, Internet and Privacy Policies University of Phoenix Com 285: Introduction to Business Communication Group: MEBSB039 May 5, 2009 E-Mail, Internet and Privacy Policies With the invention of the internet, many conveniences have been developed to help companies run more efficient. E-Mail was developed to replace standard written messages. This form of communication sped up the receipt of messages from one person to another. Internet and e-mail have become, and will remain a necessary tool for the modern business to succeed. The internet is also used as a way to communicate globally. For instance, a company with offices in the United States and the United Kingdom, now has the ability communicate information at the speed of light. With the advancement of modern technology comes the advancement of ways to steal information and violate the privacy of an employee or the company. Companies have put privacy policies in place to protect employees and the company. Information that could be misused and potentially harm the employee or put the company at risk could easily be sent over the internet through unsecured means. This paper is meant to discuss e-mail, internet use, and privacy policies at the place of employment of the writer. Secondly, we will discuss the laws put in place to regulate employee’s e-mail and internet policies. Thirdly, we will discuss the reasons...

Words: 972 - Pages: 4

Email Policy

...The purpose of this policy is to ensure the proper use of company’s email system and to make all employees aware of what the company deems as acceptable and unacceptable use of its email system. The company reserves the right to amend this policy at its discretion. In case of amendments, users will be informed appropriately. The policies are outlined below. The company considers email as an important means of communication and recognizes the importance of proper email content and speedy replies in conveying a professional image and delivering good customer service. Therefore the company wishes users to adhere to the following guidelines: • Writing emails: o Write well-structured emails and use short, descriptive subjects. o Email style is informal. This means that sentences can be short and to the point. You can start your e-mail with ‘Hi’, or ‘Dear’, and the name of the person. Messages can be ended with ‘Best Regards’. The use of Internet abbreviations and characters such as smileys however, is not encouraged. o Signatures must include your name, job title and company name. A disclaimer will be added underneath your signature. o Use the spell checker before you send out an email. o Do not send unnecessary attachments. Compress attachments larger than 200K before sending them. o Do not write emails in capitals. o Do not use cc: or bcc: fields unless the cc:...

Words: 1021 - Pages: 5

Risks Associated with Internet Based Transactions

...physically present. It has also been designed to send data back and forth, to stay connected. There are large networks and small networks, but size is irrelevant in terms of importance of network security. The purpose of network security is to protect the network and its component parts from unauthorized access and misuse. Networks are vulnerable because of their inherent characteristic of facilitating remote access. For example, if a hacker wanted to access a computer not on a network, physical access would be vital. However, with networks in the picture, it is possible to bypass that particular security aspect. Therefore, it is vital for any network administrator, regardless of the size and type of network, to implement stringent security policies to prevent potential losses. There are a number of potential pitfalls that may arise if network security is not implemented properly. Each business will identify with the need to keep certain critical information private from competitor eyes. The hospitality industry can just as easily be at risk for any of these type situations and should be aware and as up to date as they possibly can be when it comes to network security. Data is a very valuable commodity for individuals and enterprises alike. It is a testament to its importance when the proliferation of backup technology available today is considered. Destruction of data can severely cripple the victim concerned. A system break-in may be easily detectable, as some hackers tend......

Words: 683 - Pages: 3

Internet Acceptable Use Policy

...OMNICORP Industries 14 Internet Use Policy OMNICORP Devices Rodriguez, Jacob Isiah CTR NSWC Corona, MS41 CONT OMNICORP Industries 14 Internet Use Policy OMNICORP Devices Rodriguez, Jacob Isiah CTR NSWC Corona, MS41 CONT Change Management | Version History VERSION | NAME | CHANGES | DATE | APPROVED BY | 1.2 | Jacob Rodriguez | Modify Policy | 8/19/2014 | Jacob Rodriguez | 1.1 | Jacob Rodriguez | Extend and refine the policy | 7/25/2014 | Jacob Rodriguez | 1.0 | Jacob Rodriguez | Creation | 7/1/2014 | Jacob Rodriguez | Introduction OMNICORP makes internet access available to its employees where relevant and useful for their jobs. It is unfortunate that the internet can be so great but yet so risky. Accordingly, this policy shall be categorized as “Highly Important”. This will ensure the proper individuals and systems follow the policy. This internet use policy describes the rules governing internet use at the company. It also sets out how staff members are expected to behave when using the internet. As OMNICORP grows their products and services so shall this policy implementation and structure. This policy should be read alongside other key policies. The company’s Data protection and email policies are particularly relevant to staff who use the internet Purpose The internet is a powerful tool that can bring significant benefits to OMNICORP. However, it’s important every person at the company who uses the internet understands how to......

Words: 1678 - Pages: 7

Personal Computers and the Internet

...Personal Computers on the Internet The differences between Internet and Network Connections A PC makes a direct connection to a network by way of a network adapter, which might be a network port embedded on the motherboard or a network interface card (NIC). The adapter might also be an external device connecting to the PC using a USB port, SCSI external port, or a serial port. The adapter might provide a port for a network cable or an antenna for a wireless connection. (Andrews, Ph.D, n.d.). Local Area Network (LAN) is an example of a network connection. This covers a local area such as a home, office, or other building or a small group of buildings. The Ethenet is the most popular network architecture used today. The three variations of Ethernet are primarily distinquished from one another by speed. A single computer or local network connects to the Internet by way of an Internet service provider (ISP) using one of the following bandwidth technologies: • Regular telephone lines. The most common and least expensive way to connect to an ISP, requires an internal or external modem. • Cable modem. Just as with cable TV, cable modems are always connected. Cable modem is an example of broadband media. Broadband refers to any type of networking medium that carries more than one type of transmission. With a cable modem, the TV signal to your television and the data signals to your PC share the same cable. • DSL (Digital Subscriber Line) is a group of broadband......

Words: 763 - Pages: 4

Internet Use Policy

...Richman Investments Internet Use Policy Internet use, on Company time, is authorized to conduct Company business only. Internet use is subject to the possibility of security breaches and the possibility compromise of confidential information. Internet use has the potential of contamination to our system via viruses, spyware, and malware. Spyware allows unauthorized people, potential access to passwords and other confidential information. Additionally, under no circumstances may Company computers be used to obtain, view, or reach any pornographic, or otherwise immoral, unethical, or non-business-related Internet sites. Doing so can lead to disciplinary action up to and including termination of employment. Richman Investments Email Use Policy Email is to be used for Company business only. Company confidential information must not be shared outside of the Company, without authorization. You are also not to conduct personal business via the email. Viewing pornography, or sending pornographic jokes or stories via email, is considered sexual harassment and will not be tolerated. This is subject to punishment according to our sexual harassment policy. Discriminating Emails Any emails that discriminate against any employees’ race, gender, nationality, religion, and so forth, will be dealt with according to the harassment policy. These emails are prohibited by the Company. Sending or forwarding non-business emails will result in disciplinary action that may lead to......

Words: 265 - Pages: 2

Internet Usage Policy

...Employee Internet Use Monitoring and Filtering Policy Created by or for the SANS Institute. Feel free to modify or use for your organization. If you have a policy to contribute, please send e-mail to stephen@sans.edu 1.0 Purpose The purpose of this policy is to define standards for systems that monitor and limit web use from any host within 's network. These standards are designed to ensure employees use the Internet in a safe and responsible manner, and ensure that employee web use can be monitored or researched during an incident. 2.0 Scope This policy applies to all employees, contractors, vendors and agents with a -owned or personally-owned computer or workstation connected to the network. This policy applies to all end user initiated communications between ’s network and the Internet, including web browsing, instant messaging, file transfer, file sharing, and other standard and proprietary protocols. Server to Server communications, such as SMTP traffic, backups, automated data transfers or database communications are excluded from this policy. 3.0 Policy 3.1 Web Site Monitoring The Information Technology Department shall monitor Internet use from all computers and devices connected to the corporate network. For all traffic the monitoring system must record the source IP Address, the date, the time, the protocol, and the destination site or server. Where possible, the system should record the User ID of the person or account initiating the traffic.......

Words: 833 - Pages: 4

E-Mail and Internet Policy

...E-Mail and Internet Policy Darryn Cooper COM/285 Angie Robert August 24, 2011 E-Mail and Internet Policy The integrity of a business relies on communication, both using internal and external communications. E-mails and the internet are two ways that businesses communicate with shareholders, employees and their customers. In today’s global market, the use of computer guidelines and policies have been implemented to ensure that all employees adhere to those policies. Communication via the internet and use of emails should be carefully considered when using it. This essay will discuss why e-mail and internet policies have been put in place. *1Congress passed the Privacy Act of 1974, as amended, (Privacy Act) to safeguard records of information pertaining to individuals that Federal agencies or components own and maintain. The Department of Defense (DoD) policy regarding e-mail and internet use is very strict. All employees who are employed by the DoD are given a Common Access Card (CAC). The CAC is inserted into the computer and requires that you enter a password. At no time should you leave your CAC in the computer when an individual leaves his or her computer. Ashmore ( 2009), " Many federal laws affect employer regulation of email and internet uses, such as the Federal Wiretap Act; the Electronic Communications Privacy Act; and the Stored Communications Act. In addition,......

Words: 941 - Pages: 4

Internet and Email Aups

...E-mail Acceptable Use Policy Purpose E-mail is a critical mechanism for business communications at Richman Investments. However, use of Richman Investments’ electronic mail systems and services are a privilege, not a right, and therefore must be used with respect and in accordance with the goals of Richman Investments. The objectives of this policy are to outline appropriate and inappropriate use of Richman Investments’ e-mail systems and services in order to minimize disruptions to services and activities, as well as comply with applicable policies and laws. Scope This policy applies to all e-mail systems and services owned by Richman Investments, all e-mail account users/holders at Richman Investments (both temporary and permanent), and all company e-mail records. Account Activation/Termination E-mail access at Richman Investments is controlled through individual accounts and passwords. Each user of Richman Investments’ e-mail system is required to read and sign a copy of this E-mail Acceptable Use Policy prior to receiving an e-mail access account and password. It is the responsibility of the employee to protect the confidentiality of their account and password information. All employees of Richman Investments will receive an e-mail account. E-mail accounts will be granted to third-party non-employees on a case-by-case basis. Possible non-employees that may be eligible for access include: • Contractors. • Employees. • Interns. Applications for these......

Words: 1904 - Pages: 8

Internet Based Transactions

...hotel industry are considered to be plentiful. Every department in the hotel may have its individual difficulties and issues, but there may be some issues that can influence everyone. The primary issue may be the guest’s personal information along with the monetary details and that of the hotel through statistics modification. Several harmful emails and files that may have unwarranted viruses along with the hackers can be the main concerns. Illegal revelation and fabricated websites that are called spoofing may also be a concern. There are several different risks that come into play when a hotel has poor security. There is a lot of confidential information that is stored of a hotel guest for example credit card information, address information, and date of birth information. If a hotel has poor security an identity of a hotel guest can get taken very quickly. It is a must for a hotel to have very strict security coverage to keep from credit card fraud happening. One policy that might work to help internet based tractions would have to be security. Other policies such as not opening attachments, knowing where emails are coming from, and locking their computers when they are not at their desk would be crucial. Background checks and strict honesty policies would also stop internal threats before they could happen....

Words: 261 - Pages: 2

Manteaux en cuir véritable | Polytrol 20 L Ravive Carrosserie Plastique Peinture Alu Chrome Gelcoat Marbre | D.Y.N. Freaks