Download as pps, pdf, or txt
Download as pps, pdf, or txt
You are on page 1of 17

Internet Policy

1. INTRODUCTION:
• Offshoring, Inc. falls under the industry of BPO
(Business Process Outsourcing) specializing in helping
foreign companies in maintaining and managing offshore
staff. Maintaining and managing offshore staff has
become more important than ever, and its importance is
just going to keep increasing; for we have entered the
age of a true global economy as there has never been
before in recorded history. Our company serves as the
virtual office that is staffed by highly-skilled people with
the use of high-speed web connection or the so-called
internet.
The internet is a necessary component in our business and
thus it is provided to all staff regardless of position,
employment status and tenure. It is in this regard that
certain parameters should be created to ensure that proper
use of this resource is observed at all times. It is also
necessary to define level of responsibilities of each
involved personnel to be able to define the corresponding
accountabilities as well.
Disclaimer:

The Internet is a worldwide network of computers that


contains millions of pages of information. Users are
cautioned that many of these pages include offensive,
explicit, and inappropriate material. In general, it is
difficult to avoid at least some contact with this
material while using the lnternet. Even innocuous
search requests may lead to sites with highly offensive
content. Users accessing the lnternet do so at their
own risk and the company is not responsible for
material viewed or downloaded by users from the
Internet. To minimize these risks, the use of the
Internet is governed by this policy paper.
PURPOSE:

• This policy aims to provide guidance for


the appropriate use of the internet and to
ensure that use of internet among
Offshoring, Inc. employees is consistent
with policies.
SCOPE:

• This policy applies to all employees of


Offshoring, Inc
POLICIES:
1. All employees are authorized to have internet
access with certain limitations as identified
below:

a. Downloading files via torrent, P2P software, etc. which are not
work related. These files might contain viruses, which will
endanger company’s information systems.
B. Accessing, viewing or any other method for retrieving non-
job related information such as online/network games, chat
rooms, forums sites, bulletin boards, social sites like
friendster.com, myspace.com and the like, or entertainment
sites like youtube.com, megamovie.com or any other real-time
connections which occupy continuous bandwidth in the network
unless access to these sites is required / listed in employees
job description or requested by the client.

C. Sending harassing messages, derogatory comments, or


unlawful discriminatory messages related to age, color, gender,
sexual orientation, beliefs and religion using YM, ICQ, MSN,
AIM and other internet messengers.
D. Unlawful reproduction or distribution of copyrighted
information regardless of the source

E. Seeking to gain unauthorized access to information


resources using passwords belonging to others.

F. Use of internet to access vendor sites such as tipidPC.com,


sulit.com.ph, etc. to purchase personal items and to
market
personal and private business
2. Internet access is limited to working hours unless
after hours access is expressly given by the
project managers and shift supervisor.

3. Employees who wish to access the internet for


personal reasons may do so in the Internet Lounge,
the use of which is covered by a separate policy
paper.

4. If an employee is found to have engaged in any


unethical, illegal or unacceptable activities, such
activities will subject the users to discipline consistent
with iWeb’s Code of Conduct and the penalties
indicated in this policy paper.
5. NO EXPECTATION OF
PRIVACY
5.1 Employees are given computers and Internet access to assist
them in the performance of their jobs. Employees should have
no expectation of privacy in anything they create, store, send
or receive using the company's computer equipment. The
computer network is the property of the Company and may be
used only for Company purposes.

5.2 Waiver of privacy rights. User expressly waives any right of


privacy in anything they create, store, send or receive using
the company's computer equipment or Internet access. User
consents to allow company personnel access to and review of
all materials created, stored, sent or received by User through
any Company network or Internet connection.
5.3Monitoring of computer and Internet usage. The Company
has the right to monitor and log any and all aspects of its
Computer system including, but not limited to, monitoring
Internet sites visited by Users, monitoring chat and
newsgroups, monitoring file downloads, and all communications
sent and received by users. The specific content of any
transactions will not be monitored unless there is a suspicion of
improper use.

6. The Company has the right to utilize software that


makes it possible to identify and block access to
Internet sites inappropriate in the workplace.
PENALTIES:
• DESCRIPTION OF OFFENSE • TYPE OF OFFENSE
Disseminating, viewing or storing B
commercial or personal advertisements,
solicitations, promotions or any other
unauthorized materials.

Disseminating destructive code (e.g. C


viruses, trojan programs, self replicating
programs, etc.)

Irresponsible, unprofessional, unethical and B


unlawful use of the computer system.

Copying of material/s protected under


C
copyright law

Making the copyright materials available for


others to copy.
B

Sending, transmitting, or otherwise


distributing proprietary information, data, C
trade secrets or other confidential
information belonging to the company
PENALTIES:
• DESCRIPTION OF OFFENSE • TYPE OF OFFENSE

• Bypassing Company’s computer network C


security.

A
• Sending mass mails or chain letters

• Playing computer or internet games. A + Php 500

• Engaging in online chat and/or conference


which is not related to ones work
A

• Uploading or downloading large files, which B


are not related to one’s work.
PENALTIES:
• DESCRIPTION OF OFFENSE • TYPE OF OFFENSE


B
Accessing streaming audio and/or video
files not related to one’s work.

• Watching YouTube or any similar sites not


A + Php 500
related to one’s work

• Creating unnecessary load on network


traffic associated with non business related B
uses of the internet which can also cause
delay on local servers

• Downloading official files or accepting email A


with attachments without first scanning the
material with company approved virus
checking software.
PENALTIES:
• DESCRIPTION OF OFFENSE • TYPE OF OFFENSE

• Downloading games or other entertainment A


software including but not limited to screen
savers

• Displaying, storing or sending by email or


any form of electronic communication such
B
us bulletin boards, chat rooms, status
message in YM, etc) material is fraudulent,
harassing, embarrassing, intimidating,
defamatory or otherwise inappropriate or
unlawful.

• Introducing any form of malicious software C


into the company network
EFFECTIVITY AND VALIDITY

• This policy paper shall take effect


immediately after approval and should be
reviewed annually or as the need arises

You might also like