LMS EMPLOYEE NETWORK & INTERNET USAGE POLICY
Employee Network & Internet Usage Policy
This Employee Network & Internet Usage Policy is ready to be tailored for your company’s needs and should be considered a starting point for setting up your policies regarding computer usage for employees. May also be called Employee Network & Internet Policy, Company Network & Internet Policy or Computer Usage Policy.
Policy brief & purpose
Our employee Network & Internet usage policy outlines our guidelines for using our company’s Network & Internet connection, network, and equipment. We want to avoid inappropriate or illegal Network & Internet use that creates risks for our company’s legality and reputation.
This employee Network & Internet usage policy applies to all our employees, contractors, volunteers, and partners who access our network and computers or use personal devices in our network Wi-Fi or Physical access.
Employee Network & Internet usage policy elements
What is appropriate employee Network & Internet usage?
Our employees are advised to use our company’s Network & Internet connection for the following reasons:
• To complete their job duties.
• To seek out information that they can use to improve their work.
• To access their social media accounts, while conforming to our social media policy.
We do not want to restrict our employees’ access to websites of their choice, but we expect our employees to exercise good judgement and remain productive at work while using the Network & Internet. Any use of our network and connection must follow our confidentiality and data protection policy.
• Always keep their passwords secret.
• Log into their corporate accounts only from safe devices.
• Use strong passwords to log into work-related websites and services.
What is inappropriate employee Network & Internet usage?
Our employees must not use our network to:
• Download or upload obscene, offensive, or illegal material.
• Send confidential information to unauthorized recipients.
• Invade another person’s privacy and sensitive information.
• Download, upload or stream movies, music and other copyrighted material and software.
• Visit potentially dangerous websites that can compromise the safety of our network and computers.
• Perform unauthorized or illegal actions, like hacking, fraud, buying/selling illegal goods and more.
We also advise our employees to be careful when downloading and opening/executing files and software. If they are unsure if a file is safe, they should ask [their supervisor/ IT manager/ etc.]
We will not assume any responsibility if employee devices are infected by malicious software, or if their personal data are compromised because of inappropriate employee use.
We expect our employees to respect and protect our company’s equipment. “Company equipment” in this computer usage policy for employees includes company-issued phones, laptops, tablets, and any other electronic equipment, and belongs to our company.
We advise our employees to lock their devices in their desks when they’re not using them. Our employees are responsible for their equipment whenever they take it out of their offices.
Our employees can use their corporate email accounts for both work-related and personal purposes as long as they don’t violate this policy’s rules.
Employees should not use their corporate email to:
• Register to illegal, unsafe, disreputable, or suspect websites and services.
• Send obscene, offensive, or discriminatory messages and content.
• Send unauthorized advertisements or solicitation emails.
• Sign up for a competitor’s services unless authorized.
Our company has the right to monitor corporate emails. We also have the right to monitor websites employees visit on our computers.
Employees who do not conform to this employee Network & Internet usage policy will face disciplinary action. Serious violations will be cause for termination of employment, or legal action when appropriate. Examples of serious violations are:
• Using our Network & Internet connection to steal or engage in other illegal activities.
• Causing our computers to be infected by viruses, worms, or other malicious software.
• Sending offensive or inappropriate emails to our customers, colleagues, or partners.