Corporate Internet Policy

corporate internet policy slide

This article includes a complete corporate internet policy which you can download for free by signing up for QA Solutions free weekly E-zine. Then you can edit it to meet your company preferences.

Your company must consider equipment and information in any form as an asset and thus must be properly used and adequately protected. This includes the primary usage of company provided internet and intranet connections for business purposes.

Without a Corporate Internet Policy, your company could experience severe non-business abuse potentially resulting in embarrassment and / or trauma resulting in up to and including system unavailability.

Special note and refrain should be paid to the downloading of "freeware" and "shareware" which cause a dramatic increase in the likelihood of a computer virus, worm, or Trojan Horse attack.

Whether you take the hard-line approach or a softer approach, you still need published a Corporate Internet Policy to state company position / expectations for all, and to have a leg to stand on legally for the habitual abuser.

Internet Usage Risks

Following is a quick summary of some of them:

  • Legal Liability - To have a leg to stand on at all companys need to, at a minimum, publish guidelines regarding the usage of their company provided Internet connections. If not, usually employers rather than employees, who come up short at court proceedings initiated by an ex-employee as a result of being released due to chronic Internet abuse.
  • System Unavailability - Personal / non-business usage which involves the downloading of "freeware" and "shareware" cause a dramatic increase in the likelihood of a computer virus, worm, or Trojan Horse attack. This more than likely would create deteriorating response timeor, even worse, total system unavailability.
  • Detrimental Resource Usage - Personal / non-business usage consisting of downloading large files, e.g., videos, pictures, etc. use substantial network bandwidth and disk space, which results in a reduced availability of these resources for business related needs.
  • Lost Productivity - Surveys indicate that the majority of employees use company provided Internet connections for personal use. This may cause an impact on network bandwidth.
  • Harm to Reputation - This can happen via access to pornographic or inappropriate material, or participating in "chat" rooms or "blogs".
  • Confidentiality Violations - This can include the divulging of closely guarded company information via participation in "chat" rooms or "blogs", accidentally or on purpose.

Employee Handbook Kit includes two Employee Handbook templates for Professional & Manufacturing. Includes over 60 policies and benefits templates.

Employee Handbook Policies & Benefits

Corporate Internet Policy

You can manage the above noted risks formally by publishing a Corporate Internet Policy  Following are some of the positives that can begin to result from publishing your policy:

  • Greatly improved Internet Usage focus
  • Fewer Internet Usage incidents
  • Fewer audit concerns / comments
  • Greatly improved business focus
  • Reduced legal risk
  • Delivery of best practice information to employees
  • Enhances the professional perception of your business

Below starts the Corporate Internet Policy

Corporate Internet Policy Background

The company provided Internet connection is intended to be used primarily for business purposes. Any personal use must not interfere with normal business activities, involve solicitation, be associated with any for-profit outside business activity or potentially embarrass the company. Users are expected to act responsibly and in the company’s best interests whenever they use the company provided Internet connection.

Use of the Internet, as well as other company provided capabilities, tools, and assets, should be limited to situations related to work assignments. It is never acceptable to use company equipment to access or create material that is illegal or inappropriate. If in doubt, consult your manager.

The company encourages its departments to use the Internet to disseminate information to the public and its employees (collectively called "users") to improve communications with the public, and to carry out official business when such business can be accomplished consistent with the following: 1)  Use the Internet to accomplish official company business consistent with the company's mission, 2)  Company business conducted via the Internet shall comply with all statutory requirements as well as standards for integrity, accountability, and legal sufficiency, and  3) Company business conducted via the Internet should meet or exceed the standards of performance for traditional methods (such as meetings, use of telephone, etc.).

TrainingKeeper Software. Keep, organize and plan all your employees' training and activities. Software includes multi-user support with reports, certs, and calendars.

TrainingKeeper Software

Scope Applies To

  1. All Internet services provided, owned, or funded by the company.
  2. All users and holders of company Internet accounts, regardless of intended use.

Scope Does Not Apply To

  1. E-mail.
  2. Voice Mail.
  3. Audio and Video Conferencing.
  4. Facsimile messages.

Indemnification of the Company

Users agree by virtue of access to the company's computing and Internet systems, to indemnify, defend and hold harmless the company for any suits, claims, losses, expenses or damages, including but not limited to litigation costs and attorney's fees, arising from or related to the user's access to or use of company Internet and computing systems, services and facilities.

Get certified in Risk Management through our completely on-line training system. Study at your own pace.

Risk Management Certification

Specific Usage Criteria

1.   Internet services are extended for the sole use of company staff, and other appropriately authorized users to accomplish tasks related to and consistent with the company's mission. Company Internet systems and services are company facilities, resources and property. Any Internet account assigned by the company to individuals or functions of the company, is the property of the company.

2.   When an individual's affiliation with the company ends, the account will be terminated.

3.   If you are using information from an Internet site for strategic company business decisions, you should verify the integrity of that information. You should verify whether the site is updated on a regular basis (the lack of revision date might indicate out-of-date information) and that it is a valid provider of the information you are seeking. Just because the site exists does not mean that the information is accurate or valid. The company has no control or responsibility for content on an external server not under our control. Therefore, information may be offensive and/or unsuitable for dissemination.

Usage Restrictions

The following require strict adherence. Any infraction thereof could result in disciplinary action. Disciplinary actions range from verbal warnings to termination; the severity of the infraction governs the severity of the disciplinary action.

a.  Internet use is restricted to "official company business". Authorization for Internet access must be obtained through the IT department. Once authorization is approved you are responsible for the security of your account password and you will be held responsible for all use or misuse of your account. You must maintain secure passwords and never use an account assigned to another user.

b.  Hacking is the unauthorized attempt or entry into any other computer. Never make an unauthorized attempt to enter any computer. Such an action is a violation of the Federal Electronic Communications Privacy Act

c.  Never copy or transfer electronic files without permission.

d.  Downloading a file from the Internet can bring viruses with it. Scan all downloaded files with company standard virus prevention software.

e.   Never send, post, or provide access to any confidential company materials or information.

8D Manager Software with 8D, 9D, 5Y and 4M report generator. Your corrective action software for managing, measuring, and reporting issues.

8D Manager

Personal Use

For the purpose of this Corporate Internet Policy, Company internet services may be used for incidental personal purposes provided that such use does not:

1.  Directly or indirectly interfere with the company operation of computing facilities or Internet services.

2.  Interfere with the Internet user's employment or other obligations to the company.

3.  Violate these guidelines/policy, or any other applicable policy or law, including but not limited to use for personal gain, conflict of interest, harassment, defamation, copyright violation or illegal activities.

Violations

Suspected or known violations of this corporate internet policy or law should be confidentially reported to the appropriate supervisory level for the department in which the violation occurs. Violations will be processed by the appropriate company authorities and/or law enforcement agencies. Violations may result in revocation of Internet service privileges; Code of Conduct proceedings; disciplinary action up to and including dismissal; referral to law enforcement agencies; or other legal action.

PDCA Complete is an organizational task management system with built-in continuous improvement tools. Includes projects, meetings, audits and more.

Built by Quality Assurance Solutions.

PDCA Complete

Internet Usage Best Practices

Your support of the following a corporate internet policy best practices will assist us in providing you with fast and reliable Internet service:

  • Respect the business purpose for which computers and access to communication network(s) has been granted.
  • Use the computer resource capabilities in a manner that minimizes cost to the company while maximizing value for company business purposes.
  • The company may report any violation of local, state, federal, or international laws to the appropriate authorities. Misuse of external networks in violation of these guidelines and/or other company policies may result in termination of employment and/or criminal penalties, including imprisonment and fines.
  • Do not access or transmit any obscene, lewd, or pornographic material. This is strictly prohibited.
  • Do not download any "shareware" or "freeware" without explicit authorization due to the potential negative consequences to company computing resources, i.e., viruses, worms, Trojan Horses, resulting in system unavailability.
  • Abide by all applicable laws and regulations, e.g., copyright and software licensing.
  • Protect all company information according to the provisions of the company Information Security Policy.
Widget is loading comments...

More Info

  • Learn the steps to conduct software installation and upgrade process within your business to prevent mishap.

    Software Installation and Upgrade Process

    Learn the steps to conduct software installation and upgrade process within your business to prevent mishap.

  • Learn how to protect against phishing. This article identifies the most common phishing attacks and the steps your company can take to eliminate them.

    How To Protect Against Phishing

    Learn how to protect against phishing. This article identifies the most common phishing attacks and the steps your company can take to eliminate them.

  • This article discusses how to prevent computer virus download. It covers methods of virus attacks, how to prevent company damage, and much more.

    Prevent Computer Virus Download

    This article discusses how to prevent computer virus download. It covers methods of virus attacks, how to prevent company damage, and much more.

  • Review this building security checklist for a list of do's and don'ts. Use this article to teach your employees about building security and social engineering threats.

    Building Security Checklist

    Review this building security checklist for a list of do's and don'ts. Use this article to teach your employees about building security and social engineering threats.

  • The future of computer security is biometric verification

    Biometric Verification

    The future of computer security is biometric verification

  • Learn how to backup computer data for company PCs. This article lists questions your company should ask when setting up a backup system.

    Backup Computer Data

    Learn how to backup computer data for company PCs. This article lists questions your company should ask when setting up a backup system.

  • This article provides the key elements to include in an IT audit program. It considers current situation assesment, high level needs, organizational needs, PC user issues, manager responsibility, contigency, crisis, risk and a host of other issues.

    IT Audit Program

    This article provides the key elements to include in an IT audit program. It considers current situation assesment, high level needs, organizational needs, PC user issues, manager responsibility, contigency, crisis, risk and a host of other issues.

  • This article discusses business methods to prevent scary emails such as legal liability issues and describes other risks for allowing them.

    Prevent Scary Emails

    This article discusses business methods to prevent scary emails such as legal liability issues and describes other risks for allowing them.

  • This article covers network security information which focuses on IT Policy, Information Security Awareness, and IT Compliance

    Network Security Information

    This article covers network security information which focuses on IT Policy, Information Security Awareness, and IT Compliance

  • Data protection tips for your company. This article covers important issues for business data protection and data recovery

    Data Protection Tips

    Data protection tips for your company. This article covers important issues for business data protection and data recovery

  • This article covers a detailed corporate email policy. You can also freely download this policy.

    Corporate Email Policy

    This article covers a detailed corporate email policy. You can also freely download this policy.

  • Company Strike Preparation guidelines minimize company risks and downtime during a company strike.

    Strike Preparation Guidelines

    Company Strike Preparation guidelines minimize company risks and downtime during a company strike.

  • Review this IT audit tool and guide. We cover scope, physical, access control, data and applications security issues. Learn what to look for and questions to ask during the audit. We also cover what to do prior and during an IT audit.

    IT Audit Tool and Guide

    Review this IT audit tool and guide. We cover scope, physical, access control, data and applications security issues. Learn what to look for and questions to ask during the audit. We also cover what to do prior and during an IT audit.

  • This article on information security notes and policy covers many key items your business needs to consider when setting up an information security system.

    Information Security Notes and Policy

    This article on information security notes and policy covers many key items your business needs to consider when setting up an information security system.

  • This article provides guidelines for creating a computer protection security policy at your workplace. It covers general principles, passwords, copyrights, licensing, protection, prevention, and security

    Computer Protection Security Guidelines

    This article provides guidelines for creating a computer protection security policy at your workplace. It covers general principles, passwords, copyrights, licensing, protection, prevention, and security


Quality Assurance Solutions
Robert Broughton
(805) 419-3344
USA
email
Enjoy this page? Please pay it forward. Here's how...

Would you prefer to share this page with others by linking to it?

  1. Click on the HTML link code below.
  2. Copy and paste it, adding a note of your own, into your blog, a Web page, forums, a blog comment, your Facebook account, or anywhere that someone would find this page valuable.

All Products

Software, Videos, Manuals, On-Line Certifications

PDCA Complete

An Organizational Task Management System. Projects, Meetings, Audits & more

8D Manager

Corrective Action Software

TrainingKeeper Software

Plan and Track Training

Snap Sampling Plans!

AQL Inspection Software

QAS Business Slide Deck

450+ Editable Slides with support links

TRIZ Kit

Learn and Train TRIZ

ISO 9001:2015 QA Manual

Editable Template

ISO 9001:2015 QMS Kit

Templates, Guides, QA Manual, Audit Checklists

ISO 14001:2015 EMS Kit

EMS Manual, Procedures, Forms, Examples, Audits, Videos

On-Line Accredited Certifications

Six Sigma, Risk Management, SCRUM

All Products

Software, Videos, Manuals, On-Line Certifications