i)
Telephone Use and Voicemail: Records are kept of all calls made from and to a
given telephone extension. Although voicemail is password protected, an
authorized administrator can reset the password and listen to voicemail messages.
ii)
Electronic Mail: Electronic mail is backed-up and archived. Although electronic
mail is password protected, an authorized administrator can reset the password
and read electronic mail.
iii)
Desktop Facsimile Use: Copies of all facsimile transmissions sent and received are
maintained in the facsimile server.
iv)
Document Use: Each document stored on Company computers has a history,
which shows which users have accessed the document for any purpose.
v)
Internet Use: Internet sites visited, the number of times visited, and the total time
connected to each site is recorded and periodically monitored.
[YOUR COMPANY NAME] reserves the right, at its discretion and without notice, to review
any employee's electronic files and messages to the extent necessary to ensure electronic
media and services are being used in compliance with the law, this policy and other
company policies, or to investigate misconduct, to locate information, or for any other
business purpose.
b)
Employees should understand, therefore, that they have no right of privacy with respect to any
messages or information created or maintained on the Company's technology resources,
including personal information or messages. Accordingly, if they have sensitive information to
transmit, they should use other means.
All messages sent and received, including personal messages, and all data and information
stored on the Company's electronic-mail system, voicemail system, or computer systems are
Company property regardless of the content. As such, the Company reserves the right to
access all of its technology resources including its computers, voicemail, and electronic-mail
systems, at any time, in its sole discretion.
Passwords do not confer any right of privacy upon any employee of the Company. Employees
are expected to maintain their passwords as confidential. Employees must not share passwords
and must not access coworkers' systems without express authorization.
Deleting or erasing information, documents, or messages maintained on the Company's
technology resources is, in most cases, ineffective. All employees should understand that any
information kept on the Company's technology resources may be electronically recalled or
recreated regardless of whether it may have been "deleted" or "erased" by an employee.
Because the Company periodically backs-up all files and messages, and because of the way in
which computers re-use file storage space, files and messages may exist that are thought to
have been deleted or erased. Therefore, employees who delete or erase information or
messages should not assume that such information or messages are confidential.
©
C
o
p
y
r
i
g
h
t
B
i
z
T
r
e
e
.
2
0
0
6
.
A
l
l
r
i
g
h
t
s
r
e
s
e
r
v