2015 GNYADA Employee Handbook

PART 20

ELECTRONIC COMMUNICATIONS

Acknowledgment and receipt of this employee handbook authorizes GNYADA to monitor your use of GNYADA systems and devices (i.e., GNYADA -owned PCs, laptops, PDAs, and phones) and your electronic communications* utilizing any such GNYADA -owned systems. GNYADA systems and devices are the property of the GNYADA and there is no expectation of privacy regarding the usage of such systems and devices . GNYADA reserves the right to monitor, access, retrieve, read and disclose all electronic communications transmitted or received using GNYADA systems and devices. GNYADA is not assuming the duty or obligation to monitor the activities of any employee, but reserves the right to take appropriate action in accordance with this policy. Usage of GNYADA systems and devices to transmit or receive electronic communications should generally be restricted to business use, but limited reasonable personal use is permitted during nonworking time. Nonetheless, GNYADA expressly prohibits certain personal uses of its systems and devices. Such prohibited personal uses include, but are not limited to, streaming videos; transmitting chain letters; searching for another job; and disseminating or accessing any harassing, vulgar, obscene, threatening or intimidating materials. As GNYADA seeks to ensure a consistent company message and avoid misinformation, GNYADA also prohibits disseminating personal views as representing those of GNYADA. GNYADA prohibits you from: accessing, uploading, downloading, or otherwise transmitting confidential, private or proprietary information or materials, including trade secrets, customer information, budgets, revenue or expense figures or projections, strategy information, etc., without GNYADA authorization; using GNYADA systems and devices systems to gain unauthorized access to or to damage, alter, or disrupt remote computers or other systems; using another employee’s password or log-in information without authorization from your supervisor; disclosing any code or password without GNYADA authorization; enabling unauthorized third parties to have access to or use of GNYADA systems; jeopardizing the security of GNYADA systems; and using GNYADA systems and devices for illegal activities.

25

(03/15)

Made with FlippingBook HTML5