ACCEPTABLE USE POLICY
INTERNET, EMAIL AND OTHER ELECTRONIC COMMUNICATIONS
1.1 This policy applies to the users of the XXXX network or XXXX equipment, which includes but is not limited to all staff, contractors, casuals, and temporaries.
1.2 Use of the XXXX network includes transmissions to or through the XXXX network by a party described in paragraph 1.1.
1.3 This policy governs the use of all electronic communications.
Publishing and browsing on the internet,
Electronic mail (‘Email’), messaging, chat,
and file transfer.
2.1 The purpose of Electronic Communications within XXXX is to conduct the business and functions of XXXX.
3.1 It is the responsibility of Managers and supervisors to ensure that the persons to whom this Policy applies are aware of this Policy, including
(a) providing a copy of the Policy,
(b) regular and timely reminders of the need for compliance with the Policy,
(c) providing updates or developments of the Policy,
3.2 It is the responsibility of individuals to abide by the Policy.
4.1 Non-compliance with this Policy -
(i) may constitute a criminal offence, inappropriate behaviour, pose a threat to the security of the XXXX network, the privacy of staff and other persons and may expose the users of the system or other persons to legal liability. Appropriate action will be taken when a breach of the policy is identified,
4.2 Breaches of this policy -
(i) will result in disciplinary action, termination of employment,and possible reporting to the police.
5. Company Property
5.1 XXXX is the owner of, and asserts copyright over, all electronic communications created by employees as part of their employment.
5.2 Any Electronic Communications may be accessed as records of evidence in the case of an investigation. Electronic Communications may also be subject to discovery in litigation and criminal investigations
6.1 Authorised Persons may examine the records of Electronic Communications, for example, monitoring of web sites visited and the contents of Email.
6.2 Electronic Communications are provided to you on condition that you agree to monitoring in accordance with this Policy. Your use of Electronic Communications constitutes your consent to monitoring in accordance with this Policy.
7.1 Electronic Communications must not be used to send material that defames an individual, organisation, association, company or business.
8. Copyright Infringement
8.1 The copyright material of third parties (for example, software, database files, and documentation) must not be used without specific authorisation to do so
9.1 Electronic Communication is not a secure means of communication, particularly when communicated to an external party. All records and information, including customer information pertaining to the operation of XXXX, must be treated as confidential and the property of XXXX.
10.1 Electronic Communications can potentially deliver computer viruses. All data, programs and files which are downloaded electronically or attached to email should be run through a virus scan program before being l opened.
10.2 Viruses can seriously damage XXXX network. Do not open any downloaded files, Emails or attachments that you are not expecting or which look suspicious. In the event that you receive any files that you suspect contain a virus report it immediately.
11. Inappropriate content
11.1 The author and/or XXXX may be liable for what is conveyed in electronic communications, this content must only contain material that is appropriate to a work place environment.
12.1 Users are accountable for all use of XXXX systems performed with their user-ID. User-ID’s and passwords must be kept secure and confidential.
12.2 Active connections are to be terminated when access is no longer required and PCs secured by password when not in use.
13. Mass distribution (Spam)
13.1 The use of Electronic Communications for sending ‘junk mail’, for-profit messages, or chain letters is strictly prohibited and illegal.
14. Records Management
14.1 Electronic Communications are public records and subject to the provisions of the Public Records Act 1973.
14.2 Retention of email fills up disk space on the network and can slow down performance. Delete completed or unnecessary email messages.
15.1 All Emails sent externally from XXXX mail service will automatically have a disclaimer attached to them. The present disclaimer is worded as follows.
' IMPORTANT - This email and any attachments are confidential. If received in error, please contact us and delete all copies. Before opening or using attachments, check them for viruses and defects. Regardless of any loss, damage or consequence, whether caused by the negligence of the sender or not, resulting directly or indirectly from the use of any attached files our liability is limited to resupplying any affected attachments. Any representations or opinions expressed in this email are those of the individual sender, and not necessarily those of XXXX..
16.1 If you receive an internal or external Electronic Communication which is offensive or inappropriate, raise it with your manager.
17. Breaches of this policy
Breaches of this policy will generally be categorised using the following categories and guidelines.
a. Pornography – ie accessing, printing, transmitting or processing pornography. These offences are in section 70 of the Crimes Act 1958 and 57A of the Classification ( Publications, Films and Computer Games Enforcement) Act 1995.
b. Any other material or activity which involves or is in furtherance of a breach of criminal law .
c. Matters of sex, drug misuse or addiction, crime, cruelty, violence or revolting or abhorrent phenomena in such a way that reasonable adults would consider the material offends against standards of morality, decency or propriety accepted by adults.
d. Racial or religious vilification
e. Unlawfully discriminatory
g. Sexual harassment
h. Potential to bring the employee or company into disrepute
i. Company confidential material.
18 Any reference in this policy to an Act, law, Code of Conduct or other document includes a reference to the Act, law or document as amended from time to time.
18.1 In this policy, -
(i) an "Authorised Person" means a person authorised by the management of XXXX.
(ii) "copyright" does not include moral rights under the Copyright Amendments (Moral Rights) Act 2000.
(iii) "Guidelines for the Classification of Films and Videotapes (Amendment No 3)" mean the Guidelines approved by the Commonwealth, State and Territory Ministers in accordance with section 12(3) of the Commonwealth (Classifications Films and Computer Games) Act 1995 on 18 September 2000.
(iv) "Personal use" means all non work related use, and includes usage for entertainment, games, general news, gambling, communicating or involvement with unions, professional bodies or other employee representatives, hobbies, glamour, investments, Job search, motor vehicles, personal/dating, real estate, shopping, sports, travel, UseNet/News, and private emails
Effective: September 2005
Updated: September 2005
ACCEPTABLE USE POLICY
INTERNET, EMAIL AND OTHER ELECTRONIC COMMUNICATIONS
The following signature confirms that I have read understand and agree to abide by the terms and conditions stated in the ‘Acceptable use policy, for internet, email and other electronic communications’. I acknowledge that I will not use company resources for inappropriate behaviour, as stipulated in the ‘Acceptable use policy’, nor will I engage in any activity which involves or is in furtherance of a breach of criminal law. Furthermore I acknowledge that, non compliance with the ‘Acceptable use policy’ may result in disciplinary action, termination of employment, and possible reporting to the police.