The Internet: Selected Issues for Website Owners and Their Employees

SAMPLE SHORT-FORM INTERNET USE POLICY

1. Employees have access to various forms of electronic media and services (computers, e-mail, telephones, voicemail, fax machines, external electronic bulletin boards, wire services, online services, and the Internet (hereinafter referred to as "media").

2. The company encourages the use of media. However, media provided by the company are company property and its purpose is to facilitate company business.

3. The following procedures apply to all media which are:

a. accessed on or from company premises;

b. accessed using company computer equipment or via company-paid access methods;

c. communications that make reference to the company in any manner; and/or

d. used in a manner that identifies the employee with the company.

4. Media may not be used for transmitting, retrieving, or storing any communications that are of a discriminatory or harassing nature; derogatory to any individual or group; obscene; of a defamatory or threatening nature; for "chain letters"; for personal use; illegal or against company policy; or contrary to the company’s interest.

5. Electronic information created and/or communicated by an employee using media will not generally be monitored by the company. However, the company routinely monitors usage patterns for both voice and data communications (e.g., number called or site accessed; call length; times of day called) for cost analysis/allocation and the management of the Internet server. The company also reserves the right, in its discretion, to review any employee’s electronic files and messages and usage to the extent necessary to ensure that media are being used in compliance with the law and with company policy. Therefore, employees should not assume electronic communications are private and confidential.

6. Employees must respect other people’s electronic communications. Employees may not attempt to read or "hack" into other systems or logins; "crack" passwords; breach computer or network security measures; or monitor electronic filings or communications of other employees or third parties except by explicit direction of company management.

7. Every employee who uses any security measures on a company-supplied computer must provide the company with a sealed hard copy record of all passwords and encryption keys (if any) for company use if required.

8. No e-mail or other electronic communications may be sent that attempt to hide the identity of the sender or represent the sender as someone else or someone from another company.

9. Media may not be used in a manner that is likely to cause network congestion or significantly hamper the ability of other people to access and use the system.

10. Employees may not copy, retrieve, modify, or forward copyrighted materials except as permitted by the copyright owner or except for a single copy for reference use only.

11. Any information or messages sent by an employee via an electronic network are statements identifiable and attributable to the company. All communications sent by employees via a network must comply with company policy, and may not disclose any confidential or proprietary company information.

12. Network services and World Wide Web sites monitor access and usage and can identify at least which company and often which specific individual is accessing their services. Accessing a particular bulletin board or Web site leaves company-identifiable electronic "tracks" even if the employee merely reviews or downloads the material and does not post any message.

13. Any employee violating this policy will be subject to corrective action and/or risk losing the privilege of using media for him/herself and possibly other employees.

1