Menu
@BJSTwitter Can we help? 01922 645 650

I.T. AND COMMUNICATIONS SYSTEMS POLICY

CLAUSE
  1. About this policy
  2. Equipment security and passwords
  3. Systems and data security
  4. Email
  5. Using the internet
  6. Personal use of our systems
  7. Monitoring
  8. Prohibited use of our systems

     

  1. ABOUT THIS POLICY

    1. Our IT and communications systems are intended to promote effective communication and working practices. This policy outlines the standards you must observe when using these systems, when we will monitor their use, and the action we will take if you breach these standards.
    2. Abuse of the Company IT systems, services and third party IT services will be deemed as a breach of this policy and will be dealt with under our Disciplinary Procedure and, in serious cases, may be treated as gross misconduct leading to summary dismissal.
    3. This policy does not form part of any employee’s contract of employment and we may amend it at any time. BJS reserve the right to update this policy without notice to reflect changes in legislation and the needs of the business.
  2.  

  3. EQUIPMENT SECURITY AND PASSWORDS

    1. You are responsible for the security of the equipment allocated to or used by you, and you must not allow it to be used by anyone other than in accordance with this policy. You should use passwords on all IT equipment, particularly items that you take out of the office. You should keep your passwords confidential and change them regularly.
    2. You must only log on to our systems using your own username and password. You must not use another person’s username and password or allow anyone else to log on using your username and password.
    3. If you are away from your desk you should log out or lock your computer. You must log out and shut down your computer at the end of each working day.
  4.  

  5. SYSTEMS AND DATA SECURITY

    1. You should not delete, destroy or modify existing systems, programs, information or data (except as authorised in the proper performance of your duties).
    2. You must not download or install software from external sources without authorisation from ICT Services Manager. Downloading unauthorised software may interfere with our systems and may introduce viruses or other malware.
    3. You must not attach any device or equipment including mobile phones, tablet computers or USB storage devices to our systems without authorisation from ICT Services Manager.
    4. We monitor all e-mails passing through our system for viruses. You should exercise particular caution when opening unsolicited e-mails from unknown sources. If an email looks suspicious do not reply to it, open any attachments or click any links in it.
    5. We utilise, develop and procure a number of services/applications through our system which are to be used for business purposes only such as chat applications or Skype misuse of the services/applications used on or with our systems will not be permitted and will result in disciplinary action which may include dismissal.
    6. We use third party software systems/services to provide our services to customers. In addition to the terms of this policy, Third party services may also be subject to their own Data Protection/Fair Use Policies.
    7. Inform the ICT Services Manager immediately if you suspect your computer may have a virus.
  6.  

  7. EMAIL

    1. Adopt a professional tone and observe appropriate etiquette when communicating with third parties by email. You should also include our standard email signature and disclaimer.
    2. Remember that e-mails can be used in legal proceedings and that even deleted e-mails may remain on the system and be capable of being retrieved.
    3. You must not send abusive, obscene, discriminatory, racist, harassing, derogatory, defamatory, pornographic or otherwise inappropriate e-mails.
    4. You should not:
      1. send or forward private e-mails at work which you would not want a third party to read;
      2. send or forward chain mail, junk mail, cartoons, jokes or gossip;
      3. contribute to system congestion by sending trivial messages or unnecessarily copying or forwarding e-mails to others who do not have a real need to receive them; or
      4. send messages from another person’s email address (unless authorised) or under an assumed name.

    5. Do not use your own personal email account to send or receive email for the purposes of our business. Only use the email account we have provided for you.
    6. We do not permit access to web-based personal email such as Gmail or Hotmail on our computer systems at any time due to additional security risks.
  8.  

  9. USING THE INTERNET

    1. Internet access is provided primarily for business purposes. Occasional personal use may be permitted as set out in paragraph 6.
    2. You should not access any web page or download any image or other file from the internet which could be regarded as illegal, offensive, in bad taste or immoral. Even web content that is legal in the UK may be in sufficient bad taste to fall within this prohibition. As a general rule, if any person (whether intended to view the page or not) might be offended by the contents of a page, or if the fact that our software has accessed the page or file might be a source of embarrassment if made public, then viewing it will be a breach of this policy.
    3. We may block or restrict access to some websites at our discretion.
  10.  

  11. PERSONAL USE OF OUR SYSTEMS

    1. We permit the incidental use of our systems to send personal email, browse the internet and make personal telephone calls subject to certain conditions. Personal use is a privilege and not a right. It must not be overused or abused. We may withdraw permission for it at any time or restrict access at our discretion.
    2. Personal use must meet the following conditions:
      1. it must be minimal and take place exclusively outside of normal working hours (that is, during your lunch break, and before or after work);
      2. personal e-mails should be labelled “personal” in the subject header;
      3. it must not affect your work or interfere with the business;
      4. it must not commit us to any marginal costs; and
      5. it must comply with our policies including the Equal Opportunities Policy, Anti-harassment and Bullying Policy, Data Protection Policy and Disciplinary Procedure.
  12.  

  13. MONITORING

    1. Our systems enable us to monitor telephone, email, voicemail, internet and other communications. For business reasons, and in order to carry out legal obligations in our role as an employer, your use of our systems including the telephone and computer systems (including any personal use) may be continually monitored by automated software or otherwise.
    2. We reserve the right to retrieve the contents of email messages or check internet usage (including pages visited and searches made) as reasonably necessary in the interests of the business, including for the following purposes (this list is not exhaustive):
      1. to monitor whether the use of the email system or the internet is legitimate and in accordance with this policy;
      2. to find lost messages or to retrieve messages lost due to computer failure;
      3. to assist in the investigation of alleged wrongdoing; or
      4. to comply with any legal obligation.
  14.  

  15. PROHIBITED USE OF OUR SYSTEMS

    1. Misuse or excessive personal use of our telephone or email system or inappropriate internet use will be dealt with under our Disciplinary Procedure. Misuse of the internet can in some cases be a criminal offence.
    2. Creating, viewing, accessing, transmitting or downloading any of the following material will usually amount to gross misconduct (this list is not exhaustive):
      1. pornographic material (that is, writing, pictures, films and video clips of a sexually explicit or arousing nature);
      2. offensive, obscene, or criminal material or material which is liable to cause embarrassment to us or to our clients;
      3. a false and defamatory statement about any person or organisation;
      4. material which is discriminatory, offensive, derogatory or may cause embarrassment to others (including material which breaches our Equal Opportunities Policy or our Anti-harassment and Bullying Policy);
      5. confidential information about us or any of our staff or clients (except as authorised in the proper performance of your duties);
      6. unauthorised software;
      7. any other statement which is likely to create any criminal or civil liability (for you or us); or
      8. music or video files or other material in breach of copyright.
X

Your message has been sent to the team, they will review the message and get back to you shortly.

Send Us A Message


Do NOT follow this link or you will be banned from the site!