Internet, e-mail, and computer use policy
Last updated: May 24 , 2022                        

1. Policy Statement  

The use of electronic systems during working time, including computers, and all forms of Internet access, is for  company business and authorized purposes only. Brief and occasional personal use of the electronic mail system or  the Internet is acceptable as long as it is not excessive or inappropriate, occurs during personal time (lunch or other  breaks), and does not result in expense or harm to the Company or otherwise violate this policy. Use is defined as "excessive" if it interferes with normal job functions, responsiveness, or the ability to perform daily  job activities during working hours. Electronic communication should not be used to solicit or sell products or services  that are unrelated to the Company's business; distract, intimidate, or harass coworkers or third parties. Use of computers, networks, and Internet access during working hours for inappropriate conduct including, but not  limited to:
• Sending chain letters or participating in any way in the creation or transmission of unsolicited commercial e mail ("spam") that is unrelated to legitimate Company purposes; 
• Engaging in private or personal business activities, including excessive use of instant messaging and chat  rooms (see below); 
• Accessing networks, servers, drives, folders, or files to which you have not been granted access or  authorization from someone with the right to make such a grant; 
• Making unauthorized copies of Company files or other Company data; 
• Destroying, deleting, erasing, or concealing Company files or other Company data, or otherwise making such  files or data unavailable or inaccessible to the Company or other authorized users of Company systems;
• Misrepresenting oneself or the Company; 
• Violating the laws or other local jurisdiction in any way; 
• Engaging in unlawful or malicious activities; 
• Deliberately propagating any virus, worm, Trojan horse, trap-door program code, or other code or file  designed to disrupt, disable, impair, or otherwise harm either the Company's systems or those of any other  individual or entity; 
• Using abusive, profane, threatening, racist, sexist, or otherwise objectionable language in either public or  private messages; 
• Sending, receiving, or accessing pornographic materials; 
• Becoming involved in partisan politics; 
• Causing congestion, disruption, disablement, alteration, or impairment of Company networks or systems;
• Maintaining, organizing, or participating in non-work-related Web blogs ("blogs"), Web journals, "chat rooms",  or private/personal/instant messaging; 
• Failing to log off any secure, controlled-access computer or other forms of electronic data system to which  you are assigned, if you leave such computer or system unattended; 
• Using recreational games; and defeating or attempting to defeat security restrictions on company systems  and applications.  Important exception: you may use the Company's electronic systems to discuss with other coworkers the terms and  conditions of your and their work. However, any such discussions should take place during non-duty times and should  not interfere with your or your coworkers' assigned duties. You must comply with a coworker's stated request to be  left out of such discussions. Using Company electronic systems to access, create, view, transmit, or receive racist, sexist, threatening, or otherwise  objectionable or illegal material, defined as any visual, textual, or auditory entity, file, or data, is strictly prohibited. Such material violates the Company anti-harassment policies. The Company's electronic mail system and computer systems must not be used to harm others in any way. Use of company resources for illegal activity can lead to  disciplinary action, up to and including dismissal and criminal prosecution. The Company will comply with reasonable  requests from law enforcement and regulatory agencies for logs, diaries, archives, or files on individual Internet  activities, e-mail use, and computer use. Unless expressly granted in this policy, any non-business use of the Company's electronic systems is explicitly forbidden. If you violate these policies, you could be subject to disciplinary action, up to and including dismissal.

2. Ownership and Access of Electronic Mail and Computer Files; No Expectation of Privacy

The Company owns the rights to all data and files or other information system used in the Company and to all data  and files sent or received using any company system or using the Company's access to any computer network, to the  extent that such rights are not superseded by applicable laws relating to intellectual property. The Company also  reserves the right to monitor electronic mail messages (including personal/private/instant messaging systems) and  their content, as well as any and all use by Independent Contractors of the Internet and of the computer equipment  used to create, view, or access e-mail and Internet content during working hours. Independent Contractors must be  aware that the electronic mail messages sent and received, including web-based messaging systems used with such  systems or access, are not private and are subject to viewing, downloading, inspection, release, and archiving by  Company officials at all times. The Company has the right to inspect any files stored in private areas of the network or  on individual computers or storage media to assure compliance with Company policies. The Company uses software in its electronic information systems that allow monitoring by authorized personnel and  that creates and stores copies of any messages, files, or other information that is entered into, received by, sent, or  viewed on such systems. There is no expectation of privacy in any information or activity conducted, sent, performed,  or viewed on or with Company equipment or Internet access. Accordingly, your coworkers should assume that whatever  they do, type, enter, send, receive, and view on the electronic information systems during working time is electronically  stored and subject to inspection, monitoring, evaluation, and Company use at any time. Further, coworkers who use  Company systems and Internet access during working hours to send or receive files or other data that would otherwise  be subject to any confidentiality or disclosure privilege thereby waive whatever right they may have to assert such  confidentiality or claim from disclosure. Coworkers who wish to maintain their right to privacy or a disclosure privilege  must send or receive such information using some means other systems or Internet access. The Company has licensed the use of specific commercial software application programs for business purposes. Third  parties retain the ownership and distribution rights to such software. No coworker may create, use, or distribute copies of such software that are not in compliance with the license agreements for the software. Violation of this policy can lead to disciplinary action, up to and including dismissal.

3. Confidentiality of Electronic Mail

As noted above, electronic mail is subject at all times to monitoring, and the release of specific information is subject  to applicable Company rules, policies, and procedures on confidentiality. Existing regulations, policies, and procedures  governing the sharing of confidential information also apply to the sharing of information via commercial software. It is a violation of Company policy for any coworker, including system administrators and supervisors, to access  electronic mail and computer systems files to satisfy curiosity about the affairs of others, unless such access is directly  related to that coworker's job duties. Coworkers found to have engaged in such activities will be subject to disciplinary action.

4. Electronic Mail Tampering 

Electronic mail messages received should not be altered without the sender's permission; nor should electronic mail be  changed and forwarded to another user and/or unauthorized attachments be placed on another's electronic mail  message. 

5. Policy Statement for Internet/Intranet Browser(s) 

During working hours the Internet is to be used to further the Company's mission, to provide effective service of the  highest quality to the Company's customers and staff, and to support other direct job-related purposes. The various  modes of Internet/Intranet access are Company resources and are provided as business tools to Independent  Contractors who may use them for research, professional development, and work-related communications. Limited  personal use of Internet resources is a special exception to the general prohibition against the personal use of computer  equipment and software.  Independent Contractors are individually liable for any damages incurred as a result of violating company security  policy, copyright, and licensing agreements. All Company policies and procedures apply to your conduct on the Internet, mostly, but not exclusively, relating to  intellectual property, confidentiality, company information dissemination, standards of conduct, misuse of company  resources, anti-harassment, and information and data security.

6. Personal Electronic Equipment 

Due to the significant risk of harm to the company's electronic resources, or loss of data, from any unauthorized access  that causes data loss or disruption, coworkers should carefully use the personal computers or data storage devices  (such as external hard drives, USB / flash drives, "smart" phones or similar devices, laptops or other mobile computing  devices, or other data storage media) and connect them to Company electronic systems. To minimize the risk of  unauthorized copying of confidential company business records and proprietary information that is not available to the  general public, any coworker using a personal computing device, data storage device, or image-recording device to  Company networks or information systems thereby permits the Company to inspect the personal computer, data  storage device, or image-recording device at any time with personnel and/or electronic resources of the Company's  choosing and to analyze any files, other data, or data storage devices or media that may be within or connectable to  the data-storage device in question to ensure that confidential company business records and proprietary information  have not been taken without authorization. Violation of this policy, or failure to permit an inspection of any device under the circumstances covered by this policy,  shall result in disciplinary action, up to and possibly including immediate termination of your work, depending upon  the severity and repeat nature of the offence. Also, you may face both civil and criminal liability from the Company,  from law enforcement officials, or from -individuals whose rights are harmed by the violation.

 
Reg. ID 5592362353 | Jörgen Ankersgatan 11, Malmö 211 47 Sweden | info@devpals.se | + 46406820504 | Terms & Conditions | Privacy Policy | Cookies