About This Policy
Our IT and communications systems are intended to promote effective communication and working practices. This policy outlines the standards you must observe when using these systems, when we will monitor their use, and the action we will take if you breach these standards.
Breach of this policy may be dealt with under our Disciplinary and Capability Procedure and, in serious cases, may be treated as gross misconduct leading to summary dismissal.
This policy does not form part of any employee's contract of employment and we may amend it at any time.
Equipment Security and Passwords
You are responsible for the security of the equipment allocated to or used by you, and you must not allow it to be used by anyone other than in accordance with this policy. You should use passwords on all IT equipment, particularly items that you take out of the office. You should keep your passwords confidential and change them regularly.
You must only log on to our systems using your own username and password. You must not use another person's username and password or allow anyone else to log on using your username and password.
If you are away from your desk you should log out or lock your computer. You must log out and shut down your computer at the end of each working day.
Systems and Data Security
You should not delete, destroy or modify existing systems, programs, information or data (except as authorised in the proper performance of your duties).
You must not download or install software from external sources without authorisation from your Line Manager. Downloading unauthorised software may interfere with our systems and may introduce viruses or other malware.
You must not attach any device or equipment including mobile phones, tablet computers or USB storage devices to our systems without authorisation from your Line Manager.
We monitor all e-mails passing through our system for viruses. You should exercise particular caution when opening unsolicited e-mails from unknown sources. If an e-mail looks suspicious do not reply to it, open any attachments or click any links in it.
Inform your Line Manager immediately if you suspect your computer may have a virus.
Adopt a professional tone and observe appropriate etiquette when communicating with third parties by e-mail. You should also include our standard email signature and disclaimer.
Remember that e-mails can be used in legal proceedings and that even deleted e-mails may remain on the system and be capable of being retrieved.
You must not send abusive, obscene, discriminatory, racist, harassing, derogatory, defamatory, pornographic or otherwise inappropriate e-mails.
You should not:
- Send or forward private e-mails at work which you would not want a third party to read
- Send or forward chain mail, junk mail, cartoons, jokes or gossip
- Contribute to system congestion by sending trivial messages or unnecessarily copying or forwarding e-mails to others who do not have a real need to receive them
- Send messages from another person's e-mail address (unless authorised) or under an assumed name
Do not use your own personal e-mail account to send or receive e-mail for the purposes of our business. Only use the e-mail account we have provided for you.
Using the Internet
Internet access is provided for business purposes.
You should not access any web page or download any image or other file from the internet which could be regarded as illegal, offensive, discriminatory, in bad taste or immoral. Even web content that is legal in the UK may be in sufficient bad taste to fall within this prohibition. As a general rule, viewing it will be a breach of this policy if:
- Any person (whether intended to view the webpage or not) might be offended by its contents; or
- The fact that our software has accessed the webpage or file might be a source of embarrassment if made public
We may block or restrict access to some websites at our discretion, including access to web-based personal email such as Gmail or Hotmail.
Monitoring
Our systems enable us to monitor telephone, e-mail, voicemail, internet and other communications. For business reasons, and in order to carry out legal obligations in our role as an employer, your use of our systems including the telephone and computer systems (including any personal use) may be continually monitored by automated software or otherwise.
We reserve the right to retrieve the contents of e-mail messages or check internet usage (including pages visited and searches made) as reasonably necessary in the interests of the business, including for the following purposes (this list is not exhaustive):
- To monitor whether the use of the e-mail system or the internet is legitimate and in accordance with this policy
- To find lost messages or to retrieve messages lost due to computer failure
- To assist in the investigation of alleged wrongdoing
- To comply with any legal obligation
Prohibited Use of Our Systems
Misuse or excessive personal use of our telephone or e-mail system or inappropriate internet use will be dealt with under our Disciplinary and Capability Procedure. Misuse of the internet can in some cases be a criminal offence.
Creating, viewing, accessing, transmitting or downloading any of the following material will usually amount to gross misconduct and is likely to result in summary dismissal (this list is not exhaustive):
- Pornographic material (that is, writing, pictures, films and video clips of a sexually explicit or arousing nature)
- Offensive, obscene, or criminal material or material which is liable to cause embarrassment to us or to our clients
- A false and defamatory statement about any person or organisation
- Material which is discriminatory, offensive, derogatory or may cause embarrassment to others (including material which breaches our Diversity, Equity and Inclusion Policy or our Anti-Harassment and Bullying Policy)
- Confidential information about us, our business or any of our staff or clients (except as authorised in the proper performance of your duties)
- Unauthorised software
- Any other statement which is likely to create any criminal or civil liability (for you or us)
- Music or video files or other material in breach of copyright
