This article provides some insights and guidance on the best practices when developing an Internet Use Policy. You can you the information in this article as a template to draft your own version of the policy.
All employees and contractors should be provided with access to the internet to assist them in performing their jobs. Use of the internet, however, should be tempered with common sense, good judgment, and sound professional ethics. All personnel have a duty not to waste computer resources or participate in any prohibited activities.
Employees using internet access and e-mail are representing the organization. These users are responsible for ensuring that the internet is used in an effective, ethical, and lawful manner.
Companies have the right, but not the duty, to monitor any and all of the aspects of its computer system, including, but not limited to, monitoring sites visited by workforce members on the internet, monitoring chat groups and news groups, reviewing material downloaded or uploaded by users to the internet, and reviewing e-mails and IMs sent and received by users.
Companies may use software and systems (e.g. firewalls, proxy servers, gateways) that are capable of monitoring and recording all internet usage. For each user, these security measures are capable of recording each web site visited, each online forum, or e-mail message, and each file transfer into and out of the networks, and the right is reserved to conduct such monitoring and recording at any time. As described in the Acceptable Use Policy, all users have no expectation of privacy as to their internet usage. Internet activity may be reviewed and usage patterns may be analyzed. This data may be publicized to assure that the information systems are used in accordance with the provisions of this policy. Software and other technological means to identify and block access to internet sites containing sexually explicit or other material deemed inappropriate in the workplace should be used.
The company may use software to identify inappropriate or sexually explicit internet sites. Such sites may be blocked from access by the company’s networks. In the event an internet user encounters an inappropriate site or sexually explicit material while browsing on the internet, the user should immediately disconnect from the site, regardless of whether the site was subject to the organization’s blocking software.
As part of the professionalism and ethical behavior expected of all employees, workforce members should not deliberately perform acts that waste computer resources or unfairly monopolize resources to the exclusion of others. These acts include sending mass mailings or chain letters, spending excessive amounts of time on the internet, playing games, engaging in online chat groups or blogs, printing multiple copies of documents, or otherwise creating unnecessary network traffic. Because audio, video, and photos require significant disk space, files of this or other types should not be downloaded unless they’re business-related.
Files obtained from external sources, including disks brought from home; files downloaded from the Internet, newsgroups, bulletin boards, or other online services; files attached to e-mail; and files provided by customers or vendors may contain dangerous computer viruses that could damage the computer network. All users should use discretion when downloading files from the internet, accepting e-mail attachments from outsiders, or using disks from non-company sources. Any external file or portable device should first be scanned with company-approved virus checking software.
Use of any social networking web sites should not interfere with working time. On personal time, any use of social networking should not use logos, trademarks, or other intellectual property of the organization without prior approval. Keep in mind that any written messages are, or can become, public; use common sense. In no case should online information created or forwarded by employees be considered to be disparaging or derogatory towards the organization, any of its customers or potential customers, or any of its workforce members (past and current), and the message disclose any confidential or proprietary information.
In conclusion, this article has provided some guidance on the best practices when developing an Internet Use Policy. You may use the information in this article as a template to draft your own version of the policy.