E-Mail and Internet Usage

HR: EMP02 – E-mail and Internet Use
Originated: Sep. 2007
Review: Sep. 2020
Revised: Nov. 19, 2008
Approved: Sep. 2020


Answer

POLICY:

The Library Board’s e-mail and internet resources are business systems for use by authorized employees to conduct legitimate business only. Use of these connections for any purposes not specifically related to Library Board business is prohibited during working hours.

PURPOSE:

The purposes of this policy are to promote a high level of responsible behavior in connection with the use of Internet and e-mail, and to accomplish the following goals:

  1. To protect the reputation and resources of the Board, its library members, the Internet/email communities at large, from irresponsible or illegal activities.
  2. To ensure privacy, security, and reliability of the Board’s systems as well as systems of those we interface with.
  3. To establish guidelines for acceptable use of the Board’s systems and resources.
  4. To define generally those actions which are considered abusive and prohibited.
  5. To outline procedures for handling and reporting abuse.

A copy of this policy will be provided to and reviewed with all employees.

Although the Library Board respects the privacy of its employees, employees’ privacy does not extend to the employee’s use of the Board’s e-mail and Internet systems. No person using such resources should expect privacy in their communications. All e-mail communications and information downloaded from the Internet constitute Library Board Property.

RESPONSIBILITY:

Users of the Board’s Internet and e-mail systems are strictly prohibited from creating, transmitting, distributing, forwarding, downloading, and/or storing anything which:

    1. Infringes any copyright, trademark, trade secret or other intellectual property right.

    1. Is obscene, immoral, unethical, or pornographic.

    1. Is libelous, defamatory, hateful or constitutes a threat or abuse.

    1. Encourages conduct that would constitute a criminal offense or give rise to liability.

    1. Harasses the receiver, whether through language, frequency, or size of messages.

    1. Is considered e-mail junk, spam, or chain e-mail.

    1. Forges or misleads the sender’s identity.

    1. Divulges private and/or confidential information related to the Board’s business, its library members, and/or its employees.

    1. Violates any of the Board’s policies including policies related to Conduct and Behavior or Workplace Harassment.

    1. Is untruthful, misleading, or of a purely gratuitous nature.

Users of the Board’s Internet and e-mail systems must protect themselves and the Board from entering into unintended legal obligations and contracts. This includes downloading from the Internet unauthorized programs and/or software.

Users of the Internet and e-mail systems are required to take appropriate steps to ensure the security of the system by adhering to all security measures, including using and safeguarding all necessary passwords. Users are required to use only the browser software authorized by the employer.

Downloading of any programs, software or data from the Internet or e-mail directly to a user’s computer is prohibited unless authorization is provided.

Employees in breach of this policy will be subject to disciplinary action up to and including discharge for cause.

 

  • Last Updated Mar 06, 2024
  • Views 21
  • Answered By Terri Hampson

FAQ Actions

Was this helpful? 0 0