Top Print Ltd
Internet and Email Usage Policy and Guidelines
1.1 This policy sets out the obligations and expectations on employees of the Company including contractors and temporary staff, who use the Company’s IT facilities for internet and email purposes. IT facilities are provided to assist with day to day work. It is important that they are used responsibly, are not abused, and that individuals understand the legal professional and ethical obligations that apply to them.
2.1 No person is allowed to use Company IT facilities who has not previously been authorised to do so by the Company IT Department / Line Manager. Unauthorised access to IT facilities is prohibited and may result in either disciplinary action or criminal prosecution.
3.1 All users shall comply with the relevant legislation. This includes the following:
3.2.1 Data Protection Act 1998/Freedom of Information Act 2000
Any information which the Company holds is potentially disclosable to a requester under one of these pieces of legislation. This includes emails too.
Users need to be sure that they are not breaching any data protection when they write and send emails. This could include but is not limited to:
Email should where possible be avoided when transmitting personal data about a third party. Any email containing personal information about an individual may be liable to disclosure to that individual under the Data Protection Act 1998. This includes comment and opinion, as well as factual information. Therefore this should be borne in mind when writing emails, and when keeping them.
3.2.2 Computer Misuse Act 1990
This Act makes it an offence to try and access any computer system for which authorisation has not been given.
3.2.3 Copyright Design and Patents Act 1988
Under this Act it is an offence to copy software without the permission of the owner of the copyright.
3.2.4 Defamation Act 1996
Under this Act it is an offence to publish untrue statements which adversely affect the reputation of a person or group of persons.
3.2.5 Terrorism Act 2006
This Act has makes it a criminal offence to encourage terrorism and/or disseminate terrorist publications.
3.2.7 Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000.
This allows for any organisation to monitor or record communications (telephone, internet, email, and fax) for defined business related purposes.
4.1 All Users are expected to act in a manner that will not cause damage to IT facilities or disrupt IT services. Any accidental damage or disruption must be reported to IT / Line Manager as soon as possible after the incident has occurred. Users are responsible for any IT activity which is initiated under their username.
4.2 Use of the Internet
Use of the Internet by employees is encouraged where such use is consistent with their work and with the goals and objectives of the Company in mind. Reasonable personal use is permissible subject to the following:
4.3 Use of Email
Emails sent or received on the email system form part of the official records of the Company; they are not private property. The Company does not recognise any right of employees to impose restrictions on disclosure of emails within the Company. Emails may be disclosed under the Freedom of Information Act, as part of legal proceedings (e.g. tribunals), and as part of disciplinary proceedings. Users are responsible for all actions relating to their email account/pc username and should therefore make every effort to ensure no other person has access to their account.
When using Company email, users must:
Staff who receive improper email from individuals inside or outside the Company, should discuss the matter in the first instance with their line manager or supervisor.
Personal use of the Company email is not permitted.
5.1 The Company has good practice guidelines for dealing with email when staff are out of the office for longer than three days. When activating the "out of office" facility messages should name an alternative member of staff for correspondents to contact if necessary. This will ensure that any important messages are picked up and dealt with within required timescales.
5.2 During periods of absence when highly important emails are anticipated, the employee (or manager) should make arrangements for notification and access by another appropriate member of staff.
5.3 Where sensitive and confidential information needs to be sent via email for practical reasons, please be aware that email is essentially a non-confidential means of communication. Emails can easily be forwarded or archived without the original sender’s knowledge. They may be read by persons other than those they are intended for.
5.4 Users must exercise due care when writing emails to avoid being rude or unnecessarily terse. Emails sent from the Company may be interpreted by others as Company statements. Users are responsible for ensuring that their content and tone is appropriate. Emails often need to be as formal and businesslike as other forms of written correspondence.
5.5 Users should delete all personal emails and attachments when they have been read and should also delete all unsolicited junk mail. In the process of archiving emails, users should ensure inappropriate material is not archived
5.6 The Company provides a current and up to date automatic virus checker on all networked computers. However, caution should be used when opening any attachments or emails from unknown senders. Users must best endeavour to ensure that any file downloaded from the internet is done so from a reliable source. It is a disciplinary offence to disable the virus checker. Any concerns about external emails, including files containing attachments, should be discussed with the IT / Line Manager.
6. Legitimate Access to Prohibited Material
6.1 There may be circumstances where Users feels that the nature of their work means that they are required to access or use material prohibited under this policy. If so, this should be discussed with the Line Manager concerned. The Company is legally responsible for the content and nature of all materials stored on/accessed from its network.
7. Remote Users
7.1 Users may sometimes need to use Company equipment and access the Company network while working remotely, whether from home or while travelling. The standards set out in this document apply whether or not Company equipment and resources are being used.
8. Monitoring
8.1 All resources of the Company, including computers, email, and voicemail are provided for legitimate use. If there are occasions where it is deemed necessary to examine data beyond that of the normal business activity of the Company then, at any time and without prior notice, the Company maintains the right to examine any systems and inspect and review all data recorded in those systems. This will be undertaken by authorised staff only. Any information stored on a computer, whether the information is contained on a hard drive, USB pen or in any other manner may be subject to scrutiny by the Company. This examination helps ensure compliance with internal policies and the law. It supports the performance of internal investigations and assists in the management of information systems.
9. Penalties for Improper Use
9.2 Withdrawal of facilities
Users in breach of these regulations may have access to Company IT facilities restricted or withdrawn.
9.3 Disciplinary Action
Breaches of these regulations may be dealt with under the Company’s disciplinary procedures. It may lead to termination of employment from the Company.
9.4 Breaches of the law
Where appropriate, breaches of the law will be reported to the police.