Corporate Email Policy

corporate email policy slide

Corporate Email Policy Introduction

Company equipment and information in any form is considered an asset of the company and thus must be properly used and adequately protected. This includes the transmission of information over computer communication networks. In addition, the use of computing and technology investments must be for legitimate company business purposes except for personal use deviations outlined in this document.

Corporate Email Policy Purpose

The purpose of this corporate email policy assures that:

  1. E-mail will be used by company representatives in an ethical and considerate manner in compliance with applicable law and policies, including policies established by this corporate email policy.
  2. E-mail users are informed about how concepts of privacy and security apply to e-mail, as well as the applicability of relevant policy and law.
  3. Disruptions to company e-mail and other services and activities are minimized.

Corporate Email Policy Scope

This corporate email policy applies to:

  1. All e-mail services provided, owned, or funded by the company.
  2. All users and holders of company e-mail systems or accounts, regardless of intended use.
  3. All company e-mail official records in the possession of or generated by company employees and other users of e-mail services provided by the company, regardless whether the records were generated on company or non-company computers.
  4. Applies equally to transmission and receipt data including e-mail headers, summaries, and addresses associated with e-mail records and attached files or text.

This corporate email policy does not apply to:

  1. Internet services other than e-mail.
  2. Voice Mail
  3. Audio and Video Conferencing.
  4. Facsimile messages.

TrainingKeeper Software. Keep, organize and plan all your employees' training and activities. Software includes multi-user support with reports, certs, and calendars.

TrainingKeeper Software

Corporate Email Policy Specific Usage Criteria

E-mail services are extended for the sole use of company staff, and other appropriately authorized users to accomplish tasks related to and consistent with the company's mission. Company e-mail systems and services are company facilities, resources and property. This corporate email policy assures any e-mail address or account assigned by the company to individuals or functions of the company, is the property of the company.

Usage Restrictions:

a)  E-mail users are required to comply with state and federal law, this corporate email policy, other company policies, and normal standards of professional and personal courtesy and conduct. Access to company e-mail services is a privilege that may be wholly or partially restricted by the company without prior notice and without the consent of the e-mail user:

  • when required by and consistent with applicable law or policy.
  • when there is a reasonable suspicion that violations of policy or law have occurred or may occur.
  • when required to meet time-dependent, critical operational needs.

b)  Company operational units may define additional "Conditions of Appropriate Use" for local computing and network facilities to supplement this document with additional detail, guidelines or restrictions. These "Conditions" must be consistent with and subordinate to this document, and are intended to deal primarily with situations of limited resource supply.

c)  When an individual's affiliation with the company ends,  the company may attempt to forward e-mail for a reasonable period of time as determined by the company for purposes consistent with this document and the company's mission. This corporate email policy also lets the company terminate the individual's e-mail account or continue the account.

Authorized Access and Disclosure

This corporate email policy may permit the company to inspect, monitor, or disclosure of e-mail when:

  • Required by or consistent with applicable law or policy such as any appropriately issued subpoena or court order. The Electronic Communications Privacy Act of 1986 also permits messages stored on company systems to be accessed by authorized personnel in certain circumstances.
  • There is a reasonable suspicion that violations of law or this corporate email policy, or other company policy have occurred or may occur.
  • There are time-dependent, critical operational needs of company business if the company determines that the information sought is not more readily available by other means.

In such instances, the company, per this corporate email policy, will, as a courtesy, normally try to inform e-mail users prior to any inspection, monitoring, or disclosure of e-mail records, except when such notification would be detrimental to an investigation of possible violation of law or company policy. Per this corporate email policy, users are required to comply with company requests for access to and copies of e-mail records when access or disclosure is required or allowed by applicable law or policy, regardless whether such records reside on a computer housed or owned by the company. Failure to comply with such requests can lead to disciplinary or other legal action pursuant to applicable law or policy, including but not limited to appropriate company personnel policies, this corporate email policy, or Codes of Conduct.

Employee Handbook Kit includes two Employee Handbook templates for Professional & Manufacturing. Includes over 60 policies and benefits templates.

Employee Handbook Policies & Benefits

Corporate Email Policy Indemnification of the Company

Users agree by virtue of access to the company's computing and e-mail systems, to indemnify, defend and hold harmless the company for any suits, claims, losses, expenses or damages, including but not limited to litigation costs and attorney's fees, arising from or related to the user's access to or use of company e-mail and computing systems, services and facilities.

Instances of Illegal and Misuse

1.   Using e-mail for illegal activities is strictly prohibited. Illegal use may include, but is not limited to: obscenity; child pornography; threats; harassment; theft; attempting unauthorized access to data or attempting to breach any security measures on any electronic communications system; attempting to intercept any electronic communication transmissions without proper authority; and violation of copyright, trademark or defamation law.

2.   Failure to follow state law with regard to the disposition of e-mail records may lead to criminal charges. Theft or unauthorized destruction, mutilation, defacement, alteration, falsification, removal or secretion of e-mail records may lead to criminal charges.

3.   In addition to illegal activities, the following e-mail practices are expressly prohibited: entry, examination, use, transfer, and tampering with the accounts and files of others, unless appropriately authorized pursuant to this policy; altering e-mail system software or hardware configurations; or interfering with the work of others or with company or other computing facilities.

4.   If a user has been requested by another user via e-mail or in writing to refrain from sending e-mail messages, the recipient is prohibited from sending that user any further e-mail messages until such time as he/she has been notified by the system administrator that such correspondence is permissible. Failure to honor such a request shall be deemed a violation of this document.

5.   Company e-mail services may not be used for: commercial activities not approved by appropriate supervisory company personnel consistent with applicable policy; personal financial gain; personal use inconsistent with Section: "Personal Use" of this document; uses that violate other company policies or guidelines; or uses inconsistent with applicable state or federal law. This corporate email policy and other applicable company policies include, but are not limited to, policies and guidelines regarding personnel, intellectual property, or regarding sexual or other forms of harassment.

6.   E-mail users shall not give the impression that they are representing, giving opinions, or otherwise making statements of behalf of the company or any unit of the company unless expressly authorized to do so. Where appropriate, the following explicit disclaimer shall be included: "The opinions or statements expressed herein are my own and should not be taken as a position, opinion, or endorsement of the company."

8D Manager Software with 8D, 9D, 5Y and 4M report generator. Your corrective action software for managing, measuring, and reporting issues.

8D Manager

7.   Company e-mail services shall not be used for purposes that could reasonably be expected to cause, directly, or indirectly, strain on any computing facilities, or interference with others' use of e-mail or e-mail systems. Such uses include, but are not limited to, the use of e-mail services to:

 a)  Send or forward chain letters. Special note and refrain should be paid to the circulation of chain letters. This activity causes a dramatic increase in the allocation of disk space to user data, a dramatic increase in the likelihood of a computer virus attack, and places a strain on resources that could result in deteriorating message delivery and response time or, even worse, system unavailability.

 b)  "SPAM", that is, the widespread distribution of unsolicited e-mail.

 c)  "Letter-bomb", that is, to resend the same e-mail repeatedly to one or more recipients.

Corporate Email Policy Personal Use

This corporate email policy allows for incidental personal purposes provided that such use does not:

  1. Directly or indirectly interfere with the company operation of computing facilities or e-mail services.
  2. Interfere with the e-mail user's employment or other obligations to the company and this corporate email policy.
  3. violate tthis corporate email policy, or any other applicable policy or law, including but not limited to use for personal gain, conflict of interest, harassment, defamation, copyright violation or illegal activities.
  4. E-mail messages arising from such personal use shall, however, be subject to access consistent with this corporate email policy or applicable law. Accordingly, such use does not carry with it a reasonable expectation of privacy.

Employee Handbook Kit includes two Employee Handbook templates for Professional & Manufacturing. Includes over 60 policies and benefits templates.

Employee Handbook Policies & Benefits

Confidentiality

The confidentiality of e-mail cannot be assured, and any confidentiality may be compromised by access consistent with applicable law or policy, including this corporate email policy, by unintended redistribution, or due to current technologies inadequate to protect against unauthorized access. Users, therefore, should exercise extreme caution in using e-mail to communicate confidential or sensitive matters, and should not assume that their e-mail is private or confidential.

Users may not access, use, or disclose personal or confidential information without appropriate authorization, and must take necessary precautions to protect confidentiality of personal or confidential information, regardless whether the information is maintained on paper or whether it is found in e-mail or other electronic records.

Security and Preservation

1)  E-mail users and operators must follow sound business practices in providing for the security of e-mail records, data, applications programs, and systems under their jurisdiction.

2)  Users and operators must guard against storage media deterioration and e-mail record inaccessibility due to hardware or software obsolescence. To eliminate these situations, users must make provision for future accessibility by:

  • Migrating all official e-mail records to the next generation of hardware or software; or
  • Migrating only current official e-mail records to new hardware or software, or converting official e-mail records not migrated to other media (e.g., optical disk) for short term storage or to "eye readable form" (i.e., paper or microfilm) for long term storage and preservation.

3)   Users are responsible for safeguarding their identification (ID) codes and passwords, and for using them only as authorized. Each user is responsible for all e-mail transactions made under the authorization of his or her ID, and for all network e-mail activity originating from his or her workstation. Use of e-mail user identifications for commercial purposes is prohibited. Access to user identifications may not be loaned or sold.

4)   Each operational unit should establish:

  • Standards for official e-mail records identification and file organization.
  • Measures for protecting sensitive official e-mail stored electronically.
  • Procedures for file back-up

TrainingKeeper Software. Keep, organize and plan all your employees' training and activities. Software includes multi-user support with reports, certs, and calendars.

TrainingKeeper Software

Violations

Suspected or known violations of policy or law should be confidentially reported to the appropriate supervisory level for the operational unit in which the violation occurs. Violations will be processed by the appropriate company authorities and/or law enforcement agencies. Violations may result in revocation of e-mail service privileges; Code of Conduct proceedings; disciplinary action up to and including dismissal; referral to law enforcement agencies; or other legal action.

General Use Cautions

1.  Both the nature of e-mail and the public character of the company's business make e-mail less private than users may anticipate. For example, e-mail intended for one person sometimes may be widely distributed because of the ease with which recipients can forward it to others. A reply to an e-mail message posted on an electronic bulletin board intended only for the originator of the message may be distributed to all subscribers. Furthermore, even after a user deletes an e-mail record from a computer or e-mail account it may persist in whole or in part in system logs, in the directories of the person who received the message, or on system back-up tapes which may be retained for long periods of time. All these items may be subject to disclosure under applicable law and this Policy. The company cannot routinely protect users against such eventualities.

2.  E-mail, regardless whether created, received, or stored on company equipment, may be subject to disclosure or access under laws or as a result of litigation

3.  The company does not automatically comply with all requests for disclosure, but attempts to evaluate such requests against the precise provisions of the applicable law concerning disclosure and privacy.

4.  The company, in general, cannot and does not wish to be the arbiter of the contents of e-mail. Neither can the company, in general, protect users from receiving e-mail they may find offensive. Members of the company community, however, are strongly urged to use the same personal and professional courtesies and considerations in e-mail as they would in other forms of communication, and particularly those applicable to written communications since e-mail creates a tangible record of that communication.

5.  There is no guarantee, unless "authenticated" e-mail systems are in use, that e-mail received was in fact sent by the purported sender, since it is relatively easy, although a violation of this Policy, for senders to disguise their identity. Furthermore, e-mail that is forwarded may also be modified. Authentication technology is not widely and systematically in use at the company as of the date of this Policy. As with print documents, in case of doubt, receivers of e-mail messages should check with the purported sender to validate authorship or authenticity

Employee Handbook Kit includes two Employee Handbook templates for Professional & Manufacturing. Includes over 60 policies and benefits templates.

Employee Handbook Policies & Benefits

6.  Encryption of e-mail is another emerging technology that is not in widespread use as of the date of this Policy. This technology permits the encoding of e-mail so that for all practical purposes it cannot be read by anyone who does not possess the right decryption key.

7.  Inappropriate e-mail use may expose the company and individual users to claims for damages through copyright infringement, libel, breach of privacy or other personal or proprietary rights.

8.  Federal law and company policies regarding copyright and intellectual property apply to e-mail. Do not violate the copyright of others. Unless the material is legally established as being in the public domain or unless there is explicit release by the copyright owner, you may not copy e-mail information

9.  Even though an e-mail sender and recipient have deleted their e-mail, back-up copies may exist for periods of time and in locations unknown to the originator or recipient. These copies may be accessed or disclosed consistent with applicable policy or law.

E-mail Best Practices

Your support of the following "best practices" will assist us in providing you with fast and reliable electronic mail service:

General

  • Respect the business purpose for which computers and access to communication network(s) has been granted.
  • Use the computer resource capabilities in a manner that minimizes cost to the company while maximizing value for company business purposes.
  • Mail folders should not be used as long term (more than a year) filing systems. Sent e-mail and Inbox folders should be kept current (regular frequency of deleting and/or filing).
  • To avoid proliferation of "junk" e-mail, do not reply to "junk" e-mail or provide your e-mail address in Internet chat rooms or discussion groups.
  • When using web based e-mail (e.g., Outlook Web Access), be sure to logoff and close your browser session when exiting the program. This will prevent someone from accessing your e-mail with cached credentials when using a public device (such as a kiosk or computer).

This Data Analysis Video teaches you the basic tools for understanding, summarizing, and making future predictions with your collected data. Includes MS Excel templates.

Data Analysis Video

For Senders

  • Do not transmit any obscene, lewd, or pornographic material. This is strictly prohibited.
  • Personal messages should not be widely distributed utilizing company e-mail services. This is an inappropriate use of company resources.
  • The company provides electronic mail systems to employees, at company expense, for company business purposes. The company electronic mail systems should not be used to send chain letters, games, sounds, wallpaper, bitmaps or other non-business related items through the e-mail as attachments.
  • Do not use e-mail as a means to solve a problem when a phone conversation could be more effective. Consider following up an e-mail with a phone call.
  • E-mail should be used as a communication medium not as a collaboration tool. If multiple reviews, responses, markups are needed, use the appropriate collaboration tool or Network drive, as appropriate.
  • Avoid emotional overtones in your e-mail such as anger or sadness. It is best to wait before sending out such e-mail until after a "cooling off" period and another review of your message.
  • Avoid sending e-mail that may contain controversial subject matters. Once again, a phone call will have far better results.
  • Use capitalization of entire words only to highlight an important point. WHEN PEOPLE SEND AN ENTIRE MESSAGE IN CAPS, we generally perceive it as someone yelling or upset.

Get Green Belt Certified with this extensive on-line course. Learn the Six Sigma tools and steps. Earn 25 PMI PDU. Start implementing Six Sigma today

Green Belt Certification

  • Proofread e-mails before sending them.
  • Use the spell check feature routinely.
  • Use distribution lists cautiously. Send e-mail messages only to recipients who need the information.
  • Be succinct! The most effective e-mail messages are short and to the point.
  • Keep the message focused on a single topic.
  • Include a subject line that helps the recipient prioritize, file, and search messages.
  • Tag messages appropriately – do not label messages "High Priority" or "Urgent" unless required.
  • Do not use delivery and read receipts for general e-mail use. Only use these for important messages requiring receipts.
  • Do not broadcast someone else’s message without permission.
  • Choose the number and size of file attachments with great care. The entire e-mail message cannot exceed 10 Megabytes. Check the size of a file before attaching it to a message. Before sending an attachment over 4 megabytes (MB) in size, consider other delivery options, e.g., File Transfer Protocol (FTP). All large attachments should be zipped using file compression software, e.g. Winzip. The combined size of multiple attachments can also impact e-mail delivery. Multiple small attachments should be zipped together as one file. Larger attachments should be zipped and sent individually. Messaging gateways process a set amount of data per hour. The available bandwidth can fill up with large attachments thus slowing or stopping the movement of other e-mail.

PDCA Complete is an organizational task management system with built-in continuous improvement tools. Includes projects, meetings, audits and more.

Built by Quality Assurance Solutions.

PDCA Complete

  • Broadcasts to an "Everyone" e-mail group should be in support of Company business purposes, be used only where large groups of people would have an interest, and where targeting individual addresses would be too labor intensive or prone to error. Make such broadcasts only selectively and rarely.
  • Address e-mail according to the expected action – list people in the "To" field if they should respond, and in the "cc" field if they should read the message as information only. Take care not to overuse the "cc" option.
  • Avoid using blind courtesy copy addressees as they could unknowingly forward your e-mail and "reveal" themselves.
  • Consider use of message formatting because the recipient’s e-mail system may not display the message as intended by the sender. Do not depend on alignments, fonts, or colors to make a point.
  • Consider file attachment compatibility for the recipient.
  • Use e-mail communications when it is the most cost effective means. For example for overseas communication or to reduce or eliminate paper distribution.
  • Licensed application software should never be e-mailed as an attachment. This not only is an inappropriate use of company resources, it is contrary to the company’ software licensing policy.
  • Large distribution lists can also delay e-mail delivery. If any recipients are on a non-company e-mail system, e.g., Lotus Notes, cc:Mail, Internet, limit distribution to 30 names, or less, per message. Divide large distribution lists and send the message multiple times, if necessary.

Employee Handbook Kit includes two Employee Handbook templates for Professional & Manufacturing. Includes over 60 policies and benefits templates.

Employee Handbook Policies & Benefits

For Recipients

  • Develop a regular schedule for using e-mail.
  • Delete messages no longer needed.
  • File important messages into organized folders or "save to" project related data repositories.
  • Browse the subject line to identify important messages.
  • Reply or acknowledge receipt of messages promptly if the originator expects a response.
  • Use auto-replies or delegate authority when unable to check e-mail.
  • Do not reply to all recipients unless they all need to see your reply.
  • Request removal from unwanted distribution lists.
  • Do not respond to e-mail (subscribe or unsubscribe) from non-company distribution lists that are from unknown sources. The sender may be using your unsubscribe e-mail to send you more undesired information/SPAM.
  • Avoid opening e-mail attachments from an unknown or untrustworthy source, or with a suspicious or unexpected subject line. If in doubt, do not open the attachment. Immediately contact the IT Dept.
  • Attachments are also a major contributor to corruption of user e-mail files. The more attachments stored in the user's e-mailbox file, the greater the chance of corruption. Attachments that must be retained should be saved to the user's local drives or, to home or group drives on the server (preferably after being virus scanned).
Widget is loading comments...

More Info

  • Learn the steps to conduct software installation and upgrade process within your business to prevent mishap.

    Software Installation and Upgrade Process

    Learn the steps to conduct software installation and upgrade process within your business to prevent mishap.

  • Learn how to protect against phishing. This article identifies the most common phishing attacks and the steps your company can take to eliminate them.

    How To Protect Against Phishing

    Learn how to protect against phishing. This article identifies the most common phishing attacks and the steps your company can take to eliminate them.

  • This article discusses how to prevent computer virus download. It covers methods of virus attacks, how to prevent company damage, and much more.

    Prevent Computer Virus Download

    This article discusses how to prevent computer virus download. It covers methods of virus attacks, how to prevent company damage, and much more.

  • Review this building security checklist for a list of do's and don'ts. Use this article to teach your employees about building security and social engineering threats.

    Building Security Checklist

    Review this building security checklist for a list of do's and don'ts. Use this article to teach your employees about building security and social engineering threats.

  • The future of computer security is biometric verification

    Biometric Verification

    The future of computer security is biometric verification

  • Learn how to backup computer data for company PCs. This article lists questions your company should ask when setting up a backup system.

    Backup Computer Data

    Learn how to backup computer data for company PCs. This article lists questions your company should ask when setting up a backup system.

  • This article provides the key elements to include in an IT audit program. It considers current situation assesment, high level needs, organizational needs, PC user issues, manager responsibility, contigency, crisis, risk and a host of other issues.

    IT Audit Program

    This article provides the key elements to include in an IT audit program. It considers current situation assesment, high level needs, organizational needs, PC user issues, manager responsibility, contigency, crisis, risk and a host of other issues.

  • This article discusses business methods to prevent scary emails such as legal liability issues and describes other risks for allowing them.

    Prevent Scary Emails

    This article discusses business methods to prevent scary emails such as legal liability issues and describes other risks for allowing them.

  • This article covers network security information which focuses on IT Policy, Information Security Awareness, and IT Compliance

    Network Security Information

    This article covers network security information which focuses on IT Policy, Information Security Awareness, and IT Compliance

  • Data protection tips for your company. This article covers important issues for business data protection and data recovery

    Data Protection Tips

    Data protection tips for your company. This article covers important issues for business data protection and data recovery

  • This corporate internet policy covers criteria, personal use, violations, best practices and more. Download it for free and use it for your business!

    Corporate Internet Policy

    This corporate internet policy covers criteria, personal use, violations, best practices and more. Download it for free and use it for your business!

  • Company Strike Preparation guidelines minimize company risks and downtime during a company strike.

    Strike Preparation Guidelines

    Company Strike Preparation guidelines minimize company risks and downtime during a company strike.

  • Review this IT audit tool and guide. We cover scope, physical, access control, data and applications security issues. Learn what to look for and questions to ask during the audit. We also cover what to do prior and during an IT audit.

    IT Audit Tool and Guide

    Review this IT audit tool and guide. We cover scope, physical, access control, data and applications security issues. Learn what to look for and questions to ask during the audit. We also cover what to do prior and during an IT audit.

  • This article on information security notes and policy covers many key items your business needs to consider when setting up an information security system.

    Information Security Notes and Policy

    This article on information security notes and policy covers many key items your business needs to consider when setting up an information security system.

  • This article provides guidelines for creating a computer protection security policy at your workplace. It covers general principles, passwords, copyrights, licensing, protection, prevention, and security

    Computer Protection Security Guidelines

    This article provides guidelines for creating a computer protection security policy at your workplace. It covers general principles, passwords, copyrights, licensing, protection, prevention, and security


Quality Assurance Solutions
Robert Broughton
(805) 419-3344
USA
email
Enjoy this page? Please pay it forward. Here's how...

Would you prefer to share this page with others by linking to it?

  1. Click on the HTML link code below.
  2. Copy and paste it, adding a note of your own, into your blog, a Web page, forums, a blog comment, your Facebook account, or anywhere that someone would find this page valuable.

All Products

Software, Videos, Manuals, On-Line Certifications

PDCA Complete

An Organizational Task Management System. Projects, Meetings, Audits & more

8D Manager

Corrective Action Software

TrainingKeeper Software

Plan and Track Training

Snap Sampling Plans!

AQL Inspection Software

QAS Business Slide Deck

450+ Editable Slides with support links

TRIZ Kit

Learn and Train TRIZ

ISO 9001:2015 QA Manual

Editable Template

ISO 9001:2015 QMS Kit

Templates, Guides, QA Manual, Audit Checklists

ISO 14001:2015 EMS Kit

EMS Manual, Procedures, Forms, Examples, Audits, Videos

On-Line Accredited Certifications

Six Sigma, Risk Management, SCRUM

All Products

Software, Videos, Manuals, On-Line Certifications