ࡱ> /1. bjbj . UUUUUiiii u ivt\\\U\\\\\UU0\ UU\q aifF0v,|UH\\\\\\\"p\\\v\\\\\\\\\\\\\ : Acceptable email use policy - sample template Use of email by employees of [business name] is permitted and encouraged where such use 91㽶ɫƵs the goals and objectives of the business. However, [business name] has a policy for the use of email whereby the employee must ensure that they: comply with current legislation use email in an acceptable way do not create unnecessary business risk to the company by their misuse of the internet Unacceptable behaviour The following behaviour by an employee is considered unacceptable: use of company communications systems to set up personal businesses or send chain letters forwarding of company confidential messages to external locations distributing, disseminating or storing images, text or materials that might be considered indecent, pornographic, obscene or illegal distributing, disseminating or storing images, text or materials that might be considered discriminatory, offensive or abusive, in that the context is a personal attack, sexist or racist, or might be considered as harassment accessing copyrighted information in a way that violates the copyright breaking into the companys or another organisations system or unauthorised use of a password/mailbox broadcasting unsolicited personal views on social, political, religious or other non-business related matters transmitting unsolicited commercial or advertising material undertaking deliberate activities that waste staff effort or networked resources introducing any form of computer virus or malware into the corporate network Monitoring [business name] accepts that the use of email is a valuable business tool. However, misuse of this facility can have a negative impact upon employee productivity and the reputation of the business. In addition, all of the companys email resources are provided for business purposes. Therefore, the company maintains the right to examine any systems and inspect any data recorded in those systems. In order to ensure compliance with this policy, the company also reserves the right to use monitoring software in order to check upon the use and content of emails. Such monitoring is for legitimate purposes only and will be undertaken in accordance with a procedure agreed with employees. Sanctions Where it is believed that an employee has failed to comply with this policy, they will face the company's disciplinary procedure. If the employee is found to have breached the policy, they will face a disciplinary penalty ranging from a verbal warning to dismissal. The actual penalty applied will depend on factors such as the seriousness of the breach and the employee's disciplinary record. [These procedures will be specific to your business. They should reflect your normal operational and disciplinary processes. You should establish them from the outset and include them in your acceptable use policy.] Agreement All company employees, contractors or temporary staff who have been granted the right to use the companys email services are required to sign this agreement confirming their understanding and acceptance of this policy.  -.[     k %12345?h*h7 h6jh6jhU*SheP hePheP h bv5h,h6jh-h bvhJ&. @ _  j 1  Z 1 m 5? & F,1h. A!"#$% ^ 2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH @`@ NormalCJ_HaJmH sH tH N@2N  Heading 3dd@&[$\$5CJ\aJDA D Default Paragraph FontViV  Table Normal :V 44 la (k (No List B^@B Normal (Web)dd[$\$PK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK]    8@0(  B S  ?  3 -Z[k%%4    -Z[%%4  66qK^h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hH66q           7ePU*SES/^ bvJ,*6j-:-  @ p@UnknownG* Times New Roman5Symbol3. * Arial?= *Cx Courier New;WingdingsA$BCambria Math"h*g*gB 3B 3!24 3qHX ?U*S2!xx"Sample email acceptable use policy Brendan Graham Oh+'0 , L X dpx$Sample email acceptable use policy  Normal.dotmBrendan Graham2Microsoft Office Word@F#@Ha@HaB ՜.+,00 px  Sweet & Maxwell Grouph3  #Sample email acceptable use policy Title  !"#$%'()*+,-0Root Entry F a21Table(WordDocument.SummaryInformation(DocumentSummaryInformation8&CompObjy  F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q