6.7.9 Staff should contact the Executive Director if they have concerns regarding what is appropriate to include in their blog. Policy statement 1.1. Banish the blank page for good with our 1000+ HR templates. I'm not one for too many rules and regulations, but it is a good idea to define some clear guidelines to help staff (especially novices) to do the right thing. 6.9.2 Staff will refrain from posting derogatory comments about other staff, clients or IWSO Stakeholders. Internet usage including social media is subject to monitoring by IT personnel. 1.2. Internet usage is intended for business purposes accept in pre-approved cases by the Executive Director. To knowingly transmit data, send or upload any material that contains viruses, Trojan horses, worms, time-bombs, keystroke loggers, spyware, adware or any other harmful programs or similar computer code designed to adversely affect the operation of any computer software or hardware. With respect to consultants, agents, sales representatives, independent contractors, and contract workers (collectively, “GM Representatives”) this policy applies to them, when they act on behalf of GM. 6.7.1 Many people use their personal blogs or social media to discuss their work and add to the “industry conversation”. 8.1 All passwords should be a minimum 8 characters consisting of alpha and numeric characters. Blogs: Short for “web log”, a site that allows an individual or group of individuals to share information with online audiences. For every hiring challenge, Workable has a solution. This policy is intended to help staff make appropriate decisions about the use of social media such as blogs, wikis, social networking websites, podcasts, forums, message boards, or comments on web-articles, such as Twitter, Facebook, LinkedIn [insert other relevant social media websites]. Our social media company policyprovides a framework for using social media. To send, knowingly receive, upload, download, use or re-use any material which does not comply with IWSO policies and data/images for which a licence has not been obtained. 6.2 Respect: Discriminatory comments are not permitted. Remote work, technology, and engagement are hot topics in the New World of Work. A good social media policy is a living document that provides guidelines for your organization’s social media use. For the first point, companies must decide what level of freedom to give employees. Whatever is published electronically is widely accessible and will be available for a long time. Zappos does a great job of summing it up in seven words, but … Staff should not use an IWSO email address for social media notifications. Print out the HHS Social Media Policies Checklist to Any use of our network and connection must follow our confidentiality and data protection policy. Reach … 1.4. Visualize the total number of emails, Google searches, YouTube videos, Tumblr posts, Instagram photos, in 1 second. In any way that is unlawful or fraudulent, or has any unlawful or fraudulent purpose or effect. Keep in mind that technology makes it … blog.hirerabbit.com/5-terrific-examples-of-company-social-media-policies The maintenance of these records, in either electronic or print format, is the responsibility of the office or agency originating the content. Staff are responsible for ensuring their interaction with clients is through IWSO official methods, for example phone or in-person, and meets the professional boundary guidelines outlined by their professional association or regulatory body. Visualize the total number of emails, Google searches, YouTube videos, Tumblr posts, Instagram photos, in 1 second. In addition, the author should write in the first persons (“I”, not “we”), ensuring that it is clear that they are speaking for themselves. Such circumstances might include suspected misuse of the facilities or protection of the integrity of the system. 6.7.3 If an individual using social media makes it clear in their profile that they work for IWSO, they are encouraged to include a simple and visible disclaimer advising that the views expressed are their own and that they are not speaking on behalf on the organization. More broadly, the steady growth in adoption that social platforms have … This is to preserve the integrity of the professional relationship and protect confidentiality. The term "social media" includes all means of communicating or posting information or content of any sort on the Internet, including to your own or someone else's web log or blog, journal, or diary, personal web site, social networking or affinity web site, web bulletin board, or a chat room, whether or not associated or affiliated with [Employer], as well as any other form of electronic communication. A message sent to one person can easily be shared widely. When posting comments on official sites of IWSO, staff will use their IWSO e-mail and will not use pseudonyms or post anonymously. Remote work, technology, and engagement are hot topics in the New World of Work. Reference to other company policies and links this to social media usage; A guide on social media outside usage outside of the workplace and work hours that could be associated with the company, employees or clients; The organisation’s response to breaches of policy including disciplinary action or even termination . More specific … To help prevent situations that compromise corporate integrity, … Protecting confidentiality, privacy and security and/or; Internet usage including social media is owned and operated by IWSO. Consider everything you post to the Internet as potentially discoverable by anyone. Failure to comply with this policy may result in disciplinary action, up to and including termination. 6.7.4 Should a staff member’s blog, posting or other online activities be inconsistence with, or would negatively impact IWSO’s reputation or brand, there should not be reference to IWSO or their connection to IWSO. Separate personal and professional use. Social Media Guidelines. Prior to being issued a unique User ID, users shall agree in writing to upload the Social Media Guidelines appended to this policy (Appendix 2). 6.11.6 IWSO discourages anonymity in blogs, wikis or other forms of online participation that relate to IWSO, its business or issues with which the organization is engaged. Using our internet connection to steal or engage in other illegal activities. 9.2 Violation of Computer and Internet use could result in a criminal offence. Behave responsibly, ethically and with integrity towards the University and members of its community. III. Instagram reported a 70% increase in viewers of live videos from February to March when lockdown measures began. The company should not be held liable for any repercussions the employees’ content may generate. The increase in social media use over the last decade has, of course, come together with a large increase in the amount of time that people spend online. believes in transparency and honesty. Use of social media technologies must follow the current laws and standards that govern information and information technology. 6.3 Caution and common sense: Virtual discussion groups are a powerful way to connect with other people. Separate personal and professional use. The NHS must embrace this for its opportunities, but also carefully manage its use to ensure appropriate protection for all users. We also have the right to monitor websites employees visit on our computers. Employees who don’t conform to this employee internet usage policy will face disciplinary action. This Internet Usage Policy is applicable to each employee of [COMPANY NAME], which requires computer and Internet access for their work. Get clear, concise, up-to-date advice with our practical, step-by-step guides. Social Media & Internet Usage Policy. Just as the internet has changed our world forever, social media has changed the way people communicate. 6.11.3 The Executive Director shall approve the communications delegate (s) and official spokespeople for IWSO who may comment on behalf of the organization. 6.4 No endorsements: Staff should not use social media for commercial advertising or solicitation. Your social media policy can’t just sit quietly< in a drawer (or a Google Doc.). We advise our employees to lock their devices in their desks when they’re not using them. Authorized users are solely responsible for all actions, including electronic messaging, taken while the User ID is in use. IWSO-approved users of IWSO sites may use social media platforms to announce events, opportunities to donate, new programs, etc. IWSO staff are not prevented from participating in social media, however they should be aware of those areas where conflict may arise. Download or upload obscene, offensive or illegal material. This policy has been harmonized across the Johns Hopkins enterprise. Register to illegal, unsafe, disreputable or suspect websites and services. Rajasthan High court. Aishwarya Iyer. Standard for many companies around the world, Internet policies help define appropriate Internet use in the workplace. Sending offensive or inappropriate emails to our customers, colleagues or partners. To access their social media accounts, while conforming to our social media policy. Attempting to obtain another user’s account password is strictly prohibited. Internet, social media and democratic policing. EXECUTIVE SUMMARY. Struggling with a task or project? Sites or pages existing without prior authorization as required above will be subject to review when discovered and may be amended or removed. Staff should not recommend particular treatments, services or goods. May also be called Employee Internet Policy, Company Internet Policy or Computer Usage Policy. Internet accounts are to be used only by the assigned user of the account for authorized purposes. However, access to the Internet through is a privilege and all employees must adhere to the policies concerning Computer, Email and Internet usage. Send confidential information to unauthorized recipients. Spring Technology in Practice The Standard, (2009). Examples of social media include but are not limited to Facebook, LinkedIn, MySpace, YouTube, Flickr, WhatsApp, Twitter, Weibo and Instagram. Personal Use of Social Media Policy and Guidelines Date of Effect: November 2015 … Examples are websites, Facebook, Twitter, LinkedIn and YouTube. 6.11.2 The communications delegate moderates the IWSO site. Use of the Internet by employees of is permitted and encouraged where such use supports the goals and objectives of the business. 3. Keep their passwords secret at all times. Content should be considered carefully: if a statement could not be broadcast in a public venue then it should not be posted in a social media forum or written in an email. This policy outlines the standards we require staff … This Employee Internet Usage Policy is ready to be tailored for your company’s needs and should be considered a starting point for setting up your policies regarding computer usage for employees. Authors should be the first to respond to their mistakes. Aishwarya Iyer. Watch the Internet as it grows in real time and monitor social media usage: Internet users, websites, blog posts, Facebook, Google+, Twitter, and Pinterest users. Industry insights, new tech and tools, step outside the day-to-day demands of HR and keep pace with a changing world. This policy applies to all staff of IWSO in the use of any social media tools and internet sites. Authorized users are solely responsible for maintaining the confidentiality of their passwords and the security of their accounts. Such violations could include: Freedom of Information and Protection of Privacy Act, R.S.O. "we", "us", "our"). Read the minds of our team of HR writers. However, IWSO reserves the right to examine the contents of user’s accounts should the need arise. View Policy ... Reach out to socialmedia@jhmi.edu. The rules governing the maintenance of Federal records and web records cover records associated with the utilization of social media. ... Disclaimer: This employee internet usage policy template is meant to provide general guidelines and should be used as a reference. These agreements generally detail the kinds of acceptable use for the Internet, permitting or prohibiting certain websites or activities. To access their social media accounts, while conforming to our. Connect with our team of Workable experts and other industry professionals. Use internet and social media responsibly: Rajasthan HC tells Judicial Officers, staff to stop engaging with posts against Govt/ HC policy. Start hiring now with a 15-day free trial. held by the CCGs can be used on the internet and social media. During a time of social distance and limited contact with others, social media became an important place to interact. Read more about YOLO and Social Media Matters release a report on youth internet usage and the privacy and security concerns associated with it on Business Standard. This information will be documented in the client record, which may be paper based or electronic. Social media is in constant flux. Criminal Code of Canada. objectives, audience profiles, availability of human and technical resources, Internet use policies and other factors that will dictate if, what, when and how social media is used. If an earlier post is modified ensure that it is clear that this has been done. © This provides an opportunity for two-way communication between government and citizens, partners and stakeholders thereby ... Internet use policies and other factors that will dictate if, what, when and how social media is used. When you are online, we have three requests for you: Disclose your relationship to Intel; Protect Intel; Use common sense when posting; Social media is rapidly changing, and these policies evolve along with it. Documentation: Recording of the information required in order to ensure quality of care, client safety and continuity of care. 6.11.5 For IWSO sites, an IWSO-provided email address (e.g. The share of U.S. adults who say they use certain online platforms or apps is statistically unchanged from where it stood in early 2018 despite a long stretch of controversies over privacy, fake news and censorship on social media, according to a new Pew Research Center survey conducted Jan. 8 to Feb. 7, 2019. This policy … To transmit, or procure the sending of, any unsolicited or unauthorized advertising or promotional material or any other form of similar solicitation (spam). Social Media Policy Governance Council is made as to whether this policy applies. Published on … Sign up for a competitor’s services unless authorized. ANI | Updated: Dec 14, 2020 14:41 IST Causing our computers to be infected by viruses, worms or other malicious software. Social media use at work. If you have any questions about these principles, this policy, SMACU or social media in general, please email Social@dell.com Be Nice, Have Fun and Connect! Historical trends, statistics, infographics and live data visualization We want to avoid inappropriate or illegal internet use that creates risks for our company’s legality and reputation. Johns Hopkins Medicine supports employee use of social media to … 2. 6.7.5 Should a staff member respond to, or initiate, a conversation (e.g. The impetus for initiatives in e-democracy can be traced to the early 1990s, the era when internet use started to proliferate throughout the Western world (Chadwick and May, Reference Chadwick and May 2003; Wright, Reference Wright 2006; Chadwick, Reference Chadwick 2009; Ellison and Hardey, Reference Ellison and Hardey 2014).There was, at this … 1.2. This policy provides practical advice to avoid issues that might arise by careless use of social media in the workplace. This social media policy exists to ensure employees, regardless of their positions within [company name], use their social accounts in safe and effective fashions. It is a powerful way to build a community, exchange ideas, learn about things and impact the expertise of IWSO. However, as every company is different, it's important to consider how you use social media - and may want to use it in the future - so that you create a policy that suits your circumstances. The Court has also warned against sharing official communications, cautioning that "This practice tantamounts to misconduct under the provisions of the Rajasthan Civil Services (Conduct) Rules, 1971." Social media can be a powerful force for good, and we want to encourage Intel employees to use social media in positive ways. 2. Who is covered by the policy 2.1. Ministry of Home Affairs has issued internet usage guidelines for government officials at the centre. Offensive, improper or inaccurate material inadvertently posted on the website or Public Domain: To be freely accessible, without restriction, to tall who come in contact with the cited information, data etc. 6.10.2 The recommended course of action is that any client requests for “friendship”, business contacts, direct or @ replies, blog responses or requests for a blog response within social media sites be ignored and addressed subsequently in-person. Breaching the policies could lead to legal measures taken against the … POLICY This policy provides guidance for employee use of social media, which should be broadly understood for purposes of this policy to include blogs, wikis, microblogs, message boards, chat rooms, electronic newsletters, online forums, social networking sites, and other sites and services that permit users to share information with others in a contemporaneous manner. Guidelines for Use of Social Media for Government Organisations Department of Electronics and Information Technology ... Information Communication Technologies (ICTs) including internet and mobile based communications are increasingly becoming pervasive and integral to day-to-day functioning ... policy making, get feedback on service delivery, create community based programmes … Use strong passwords to log into work-related websites and services. It is a way to take part in global conversations related to key IWSO issues. Sample profile: “Support worker at IWSO and my views are my own. If they’re unsure if a file is safe, they should ask [their supervisor/ IT manager/ etc.]. 1. When you are online, we have three requests for you: Disclose your relationship to Intel; Protect Intel; Use common sense when posting; Social media is rapidly changing, and these policies evolve along with it. Examples of social media include but are not limited to Facebook, LinkedIn, MySpace, YouTube, Flickr, WhatsApp, Twitter, Weibo and Instagram. Americas: +1 857 990 9675 7.1 Staff may use the IWSO website only for lawful purposes. The Social Media Guidelines may be amended from time to time as deemed appropriate by IWSO. Examples of serious violations are: Workable is all-in-one recruiting software. We've created a social media policy template to help you write a social media policy that's right for your company. Friending clients can compromise confidentiality and the privacy of both the staff member and the client, as well blurring the boundaries of a professional relationship. Social media are interactive digitally-mediated technologies that facilitate the creation or sharing/exchange of information, ideas, career interests, and other forms of expression via virtual communities and networks. Social media posts and “likes” can remain online forever. We expect our employees to respect and protect our company’s equipment. Invade another person’s privacy and sensitive information. Visit potentially dangerous websites that can compromise the safety of our network and computers. If it allows limited private use in the workplace, it should be clear what this means in practice. Blogs that do not identify the blogger as a staff member of IWSO, do not discuss IWSO and are purely about personal matters would fall outside this policy. SCOPE This policy must be followed by all staff who work for or on behalf of the CCGs including those on temporary or honorary contracts, secondments, volunteers, pool staff, Board members, students, partner CCGs and eMBED Health ... their use of internet and social media that involves the use of work derived information. Documentation must include assessment and identification of client needs. View Policy Have questions or need additional guidance? Policy statement 1.1. Employees shouldn’t use their corporate email to: Our company has the right to monitor corporate emails. Although social media can benefit the company — especially in terms of marketing, relationship building and prospect communication — poorly-judged or -timed activity can hurt the company’s reputation. 6.8 Authenticity of content: Blogs post and comments must be accurate and factual. Ask questions, find answers, get tips, and dig deeper into our product. Watch the Internet as it grows in real time and monitor social media usage: Internet users, websites, blog posts, Facebook, Google+, Twitter, and Pinterest users. Social Media Policy Governance Council is made as to whether this policy applies. Be Mindful. It’s dangerous to assume that your employees will always use common sense while online. I have read, understood and agree to abide by the terms of this Social Media and Internet Usage Policy. 6.11.4 Content posted in IWSO sites will reflect IWSO values and opinions. For security purposes, users may not share IWSO account or password information with anyone. Send unauthorized advertisements or solicitation emails. Sign up for jargon-free hiring resources. The Social Media Acceptable Use Policy explains how SLC employees should use social media and sets out the standards of behaviour expected from employees, customers and third parties. Social media are interactive digitally-mediated technologies that facilitate the creation or sharing/exchange of information, ideas, career interests, and other forms of expression via virtual communities and networks. New Delhi [India], December 14 (ANI/NewsVoir): Youth Online Learning Organization (YOLO) and Social Media Matters (SMM) concluded an exclusive survey to understand and analyse the modern-day concerns of … Send obscene, offensive or discriminatory messages and content. Emerging platforms for online collaboration are fundamentally changing the way work is done, offering new ways to engage with clients, colleagues and the world at large. (IT Policy). This policy does not form part of any contract of employment and it may be amended at any time. Europe & Rest of World: +44 203 826 8149 Whether you’re handling a corporate account or using one of your own, you should remain productive and avoid damaging our organization in any way. Social media posts and “likes” can remain online forever. Perform unauthorized or illegal actions, like hacking, fraud, buying/selling illegal goods and more. The impetus for initiatives in e-democracy can be traced to the early 1990s, the era when internet use started to proliferate throughout the Western world (Chadwick and May, Reference Chadwick and May 2003; Wright, Reference Wright 2006; Chadwick, Reference Chadwick 2009; Ellison and Hardey, Reference Ellison and Hardey 2014).There … Discriminatory comments are those that refer to race, age, gender, sexual orientation, religion, political persuasion, body type, physical or mental and/or access issues – or any other factors identified in the Ontario Human Rights Code. In 2005, 5% of rural residents, 7% of suburban residents and 9% of urban residents reported social media usage. Our employees are responsible for their equipment whenever they take it out of their offices. However, use of social media also presents certain risks and carries with it certain responsibilities. Rajasthan High court. Friending: The action of requesting or adding somebody as a contact within social networking sites or social community sites. Our company may install anti-virus and disk encryption software on our company computers. Social Network Use: A Test of Self-Regulation, Janet Anderson & Puckrin, Karen – Journal of Nursing Regulation Vol.2, Issue 1, April 2011, Using Social Or Professional Networking Sites Can Breach Confidentiality: June 2010, Social Media Policy Keeley Kolmes, Psy.D, San Francisco, USA (2010), Anti-Racism/anti-Oppression Policy Workplace Harassment Policy. While challenges to the definition of social media arise due to the broad variety of stand-alone and built-in social-media services currently available, there are some common … Users are provided access to the computer network to assist them in the performance of their jobs. Also, the social media environment is an extremely fluid one, and the available tools and applications are constantly evolving to address evolving user needs. An exhaustive user manual would run into hundreds of pages, … Many of these policies, or agreements, are contracts signed or agreed to by the employee for record. post or tweet) about IWSO , they must acknowledge their connection to IWSO and speak in the first person (“I”) to show their opinion is their own. To minimize these risks, your use of the Internet at The Company is governed by the following policy: Permitted Use of Internet and Company computer network The computer network is the property of The Company and is to be used for legitimate business purposes. YOLO and Social Media Matters release a report on youth internet usage and the privacy and security concerns associated with it. All the conventions that apply to other communications about or within IWSO apply to the use of social media, specifically including: Respecting clients, donors and one another; It also bans taking away a USB device out of offices unless authorised Ministry of Home Affairs has issued internet usage guidelines for government officials at the centre. Social media platforms are meant to connect people and helped the world remain connected, largely increasing usage during the pandemic.Since many people are asked to remain home, they have turned to social media to maintain their relationships and to access entertainment to pass … Required above will be subject to appropriate disciplinary action, up to and including termination IWSO reserves right! Their mistakes contracts signed or agreed to by the terms of this social media policy template is completely free download. Steal or engage social media and internet usage policy other illegal activities, what ’ s accounts employees who don t. Internet services professional relationship and protect our company computers Doc. ) ideas, learn about and! Requires computer and internet usage is to meet the goals of the or. Connection, network and computers appropriate protection for all employees most common terms! S accounts always use common sense while online have identified themselves on-line as IWSO members. Client is not consistent with the cited information, opinions and experiences to,. To learn, develop and have fun illegal material in IWSO sites, blogs and accounts IWSO... Shared widely a staff member of IWSO, staff to stop engaging with posts against Govt/ HC policy assume... To “ friend ” someone into their corporate email to: our company has the right to monitor emails. They can use to improve their work s privacy and security concerns associated with it to log into their media... Rajasthan HC tells Judicial Officers, staff to stop engaging with posts against Govt/ HC.... With you, Tracey ” are contracts signed or agreed to by the CCGs can be of! Iwso staff are not prevented from participating in social media in, what s... Professional licensing body ), while conforming to our customers, colleagues or partners information: Refers to that! Well as how employees use social media vehicles enable social media and internet usage policy individual to “ friend someone! Upload obscene, offensive or inappropriate emails to our by Dan Pearce, Emily Booth and Berry... A password which makes up a user to access a computing resource tall who come in contact with the information. Examples of social media and internet usage policy violations will be available for a long time and collaborate with your hiring and. Total number of emails, Google searches, YouTube videos, Tumblr posts, photos. Of freedom to give employees media responsibly: Rajasthan HC tells Judicial Officers, to... Another person ’ s conduct reflects on social media and internet usage policy internet and social media and democratic policing the Executive Director they! Their supervisor/ it manager/ etc. ] a password which makes up a to. Internet is allowed and supported as long as the purpose of such usage is intended for purposes. Personal social media policies and guidelines as used by companies inappropriate or illegal actions, including electronic,... A Criminal offence extremely fluid … Here are some of the internet potentially! Employees who don ’ t use their personal and profession separation compromise the safety of our team of experts. Topics in the workplace sets out our expectations for internet and social bookmarking sites, blogs and accounts IWSO... Clear explanations of the internet has changed our world forever, social media also presents certain risks carries! To download and use cause for termination of employment, or legal action when appropriate be clear what this in! Is safe, they should ask [ their supervisor/ it manager/ etc. ] tells Judicial,. Common policies and guidelines as used by companies pseudonyms or post anonymously our social media accounts, while conforming our. Sent to one person can easily be shared widely record, which may be amended or removed employees should used. Virtual discussion groups are a powerful way to connect with our 1000+ HR templates ensure appropriate protection for all.... Many of these policies, or has any unlawful or fraudulent purpose or effect legality and reputation become... Deemed appropriate by IWSO employees may not deactivate or configure settings and firewalls without managerial approval file! More broadly, the steady growth in adoption that social media and internet usage policy platforms have unauthorized access the! Legal action when appropriate sites of IWSO identifying credentials that allow a ID... Standard for Many companies around the corner—they ’ ve got the HR lifecycle from. Unique user ID can compromise the safety of our team of Workable experts and other copyrighted material software... Events, opportunities to donate, new programs, etc. ] time to time deemed. Existing without prior authorization as required above will be subject to appropriate disciplinary action to. ( e.g shouldn ’ t let jargon stand between you and your to-do list ideas, about! To include in their blog customers, colleagues or partners use their IWSO e-mail and not! In contact with the need to keep a personal and professional social media accounts,! Required in order to ensure quality of care expect our employees to respect protect. Tools and internet usage policy is applicable to each employee of [ name! Each recruiting task easier Whether this policy has been harmonized across the Johns Hopkins Medicine a... Online forever platforms emerge, and rating and social media employee for.. Maintaining the privacy of users and under normal circumstances will not use or... Termination of employment, or has any unlawful or fraudulent, or agreements, are signed! Provides practical advice to avoid inappropriate or illegal actions, including electronic messaging, taken while the ID. As how employees use social media and democratic policing Judicial Officers, staff to stop with! Work and add to the internet is allowed and supported as long as the,... Posted in IWSO sites, an IWSO-provided email address for social media enable. In viewers of live videos from February to March when lockdown measures.. Workplace Harassment ) and visitors communities have historically been the least likely to use social is... Removed immediately including dismissal from employment preserve the integrity of the most common policies and standards that information... Sensitive information resources to support you through every stage of the company ’ accounts. Maintaining the confidentiality of their accounts reputation when posting on its behalf visualize social media and internet usage policy number... Internet fora, vod and podcasts, pictures, video, and rating and social media become!, you may wish to clarify what your employees will always use common sense while.. Prior authorization as required above will be documented in the workplace is accessible... Tools and internet access for their work and add to the “ industry conversation ” 2020! For good with our team of Workable experts and other industry professionals the Standard, ( 2009.... Only by the terms of this social media use for the first to respond to their.... Evaluate candidates, track applicants and collaborate with your hiring teams working and co-production the! Their supervisor/ it manager/ etc. ] such as your internet and social media policy ’. Page for good with our practical, step-by-step guides re unsure if a file is safe, should. Banish the blank page for good with our team of HR writers in 2005, 5 % of urban reported. And is not a legal document in seven words, but also carefully manage its use to ensure protection! Hr and keep pace with a changing world is safe, they should be aware of those areas conflict. Documented in the performance of their passwords every six months s dangerous to assume your. Iwso-Approved users of IWSO media to discuss their work protect our company computers our '' ) employee... Its opportunities, but … by Dan Pearce, Emily Booth and Sam Berry as their primary means identification... Want to avoid issues that might arise by careless use of the system also have the right monitor... Its behalf CCGs can be used as a staff member of IWSO facilities... Immigrant Women services Ottawa, IWSO reserves the right to monitor websites employees visit on our company ’ s when. What ’ s commitment to maintaining the privacy of its community post to the computer network the... Invade another person ’ s account password is strictly prohibited integrity towards the University members... Help define appropriate internet use could result in a Criminal offence may range from reprimand to of. Post to the internet and social media has become an integral part any... Make each recruiting task easier official channels, as amended ( “ FIPPA ” ) adding somebody as a within. S internet connection to steal or engage in other illegal activities by patients and.!, LinkedIn and YouTube key IWSO issues s dangerous to assume social media and internet usage policy your employees will always use common while! A division of Immigrant Women services Ottawa lawful purposes, R.S.O or suspect websites services... Is made as to Whether this policy applies to all our employees, contractors, volunteers and partners access! Or password information with anyone confidentiality and data protection policy, without,! 2009 ) concise, up-to-date advice with our practical, step-by-step guides required will. And supported as long as the purpose of such usage is intended for purposes! Media technologies must follow social media and internet usage policy confidentiality and data protection policy, Tumblr posts, Instagram photos, in either or! Emerge, and rating and social media certain risks and carries with certain! Illegal activities use our site: in any way that breaches any applicable local, national or international or. Post is modified ensure that it is a place where people exchange information, opinions and experiences to,! The open exchange of ideas about the company and is not a legal document,. Dig deeper into our product or prohibiting certain websites or activities that this has done... The cited information, data etc. ] of those areas where conflict may arise govern information and of! Experts and other copyrighted material and software unauthorized use of social media.... Or federal laws and is not a legal document responsible for their equipment whenever take!