IT Infrastructure Policy

The following policy describes how employees are required to access and use the company's IT Infrastructure. IT infrastructure refer to but is not limited to: Personal Computers (PC), laptops, tablets, mobile phone and related devices, servers, data management and storage systems, Point of Sale systems, computer peripherals, printers, scanners, software whether installed on an employee's computer or on a server or whether accessed through a web browser, email and related communication systems etc
  1. 1

    Computer & Email Usage

    To help you do your job, the company may give you access to computers, computer files, the email system, and software.  To make sure that all employees follow this policy, we may monitor computer and email usage.

    We try hard to have a workplace that is free of harassment and sensitive to the diversity of our employees. Therefore, we do not allow employees to use computers and email in ways that are disruptive, offensive to others, or harmful to morale.

    You cannot display, download, or email sexually explicit images, messages, and cartoons. You also may not use computers and email for ethnic slurs, racial comments, or anything that another person might take as harassment or disrespect.

    You may not use email to ask other people to contribute to or to tell them about businesses outside of the company, religious or political causes, outside organizations, or any other non-business matters.

    The company buys computer software licenses for business purposes. We do not own the copyright to this software or its documentation. You may only use software on local area networks or on multiple machines according to the software license agreement. The company prohibits the illegal duplication of software and its documentation.

    If you know about any violations to this policy, notify your Supervisor, the Information Technology Department or any member of management. Employees who violate this policy are subject to disciplinary action, up to and including termination of employment.


  2. 2

    Internet Usage

    The company may provide you with Internet access and a company email address to help you do your job. This policy explains our guidelines for using the Internet which includes browsing, sending, sharing and receiving messages through emails and other services. We do not allow personal use of the Internet and/or our email system and/or software.

    All Internet data that is written, sent, or received through our computer systems is part of the company's official records. That means that we can be legally required to show that information to law enforcement or other parties. Therefore, you should always make sure that the business information contained in Internet email messages and other transmissions is accurate, appropriate, ethical, and legal.

    The equipment, services, and technology that you use to access the Internet are the property of the company. Therefore, we reserve the right to monitor how you use the Internet. We also reserve the right to find and read any data that you write, send, or receive through our online connections or stored in our computer systems and that subject to approval from the Chief Executive Officer.

    You may not write, send, read, or receive data through the Internet that contains content that could be considered discriminatory, offensive, obscene, threatening, harassing, intimidating, or disruptive to any employee or other person.

    Examples of unacceptable content include (but are not limited to) sexual comments or images, racial slurs, gender-specific comments, or other comments or images that could reasonably offend someone on the basis of race, age, sex, religious or political beliefs, national origin, disability, sexual orientation, or any other characteristic protected by law.

    The company does not allow the unauthorized use, installation, copying, or distribution of copyrighted, trademarked, or patented material on the Internet. As a general rule, if you did not create the material, do not own the rights to it, or have not received authorization for its use, you may not put the material on the Internet. You are also responsible for making sure that anyone who sends you material over the Internet has the appropriate distribution rights.

    If you use the Internet in a way that violates the law or the company policies, you will be subject to disciplinary action, up to and including termination of employment. You may also be held personally liable for violating this policy.

    The following are some examples of prohibited activities that violate this Internet policy:

    • Sending, sharing or posting discriminatory, harassing, or threatening messages or images

    •  Using the organization's time and resources for personal gain

    •  Stealing, using, or disclosing someone else's code or password without authorization

    •  Copying, pirating, or downloading software and electronic files without permission

    •  Sending, sharing or posting without authorization confidential material, trade secrets, or proprietary information outside of the organization

    • Violating copyright law

    • Failing to observe licensing agreements

    • Engaging in unauthorized transactions that may incur a cost to the organization or initiate unwanted Internet services and transmissions

    •  Sending, sharing or posting messages or material that could damage the organization's image or reputation

    •  Participating in the viewing or exchange of pornography or obscene materials

    •  Sending or posting messages that defame or slander other individuals

    •  Attempting to break into the computer system of the company, another organization or person

    •  Refusing to cooperate with a security investigation

    •  Sending or posting chain letters, solicitations, or advertisements not related to business purposes or activities

    • Using the Internet for political causes or activities, religious activities, or any sort of gambling

    • Jeopardizing the security of the organization's internet facility and electronic communications systems

    •       Sending, sharing or posting messages that disparage another organization's products or services

    •       Passing off personal views as representing those of the organization

    •       Sending anonymous email messages

    •       Engaging in any other illegal activities


  3. 3

    Workplace Monitoring

    The company may conduct workplace monitoring to help ensure quality control, employee safety, security, and customer satisfaction.

    All computer equipment, services, or technology that we furnish you are the property of the company. We reserve the right to monitor computer activities and data that is stored in our computer systems. We also reserve the right to find and read any data that you write, send, or receive by computer.

    Because we are sensitive to employees' legitimate privacy rights, we will make every effort to guarantee that workplace monitoring is always done ethically and with respect and after approval from the Chief Executive Officer.


If you still have a question, we’re here to help. Contact us