Not a Tech Pro Research member? Sign up for a Free Trial and get access to this content and more for one week.
- Originally Published:
- Sep 2016
This policy describes employee privacy guidelines and outlines employee privacy expectations. You can use it as is or customize it to fit the needs of your organization.
From the policy:
The organization provides computers, internet access, electronic messaging (email), smartphones, and other IT equipment and services to enable employees, contractors, temporary staff, volunteers, and other authorized agents to fulfill their professional responsibilities. All IT equipment and services are provided only for the purpose of enabling business operations and increasing productivity.
This policy applies to all full-time employees, contract workers, consultants, part-time staff, temporary workers, and other authorized personnel awarded organization-provided IT equipment and services.
The organization’s IT equipment, services, and systems are intended for business use only. However, the organization acknowledges that staff, consultants, and volunteers occasionally require opportunities to make or receive personal phone calls, access personal email, utilize popular social media sites, and visit internet sites, as long as the aforementioned activities are not excessive in duration or frequency and do not violate other written organization policy prohibitions.
The organization’s staff, consultants, and volunteers may expect a reasonable amount of privacy. The organization and management trust staff, consultants, and volunteers to work on organization business while at work with the exception of break periods or observed lunches. During a staff member’s, consultant’s, or volunteer’s regular work shift, the individual may receive phone calls, email messages, electronic communications, and social media updates unrelated to work as long as these activities are not excessive or frequent and do not interfere with the regular performance of job duties or violate any written policy prohibitions.
Tech Pro Research members log in here to download