This policy is intended to provide Arkansas Support Network employees with the guidelines associated with the use of the Company information technology (IT) resources and communications systems.
This policy governs the use of all IT resources and communications systems owned by or available at the Company, and all use of such resources and systems when accessed using your own devices, including but not limited to:
- Email systems and accounts.
- Internet and intranet access.
- Telephones and voicemail systems, including wired and mobile phones, smartphones, and pagers.
- Printers, photocopiers, and scanners.
- Fax machines, e-fax systems, and modems.
- All other associated computer, network, and communications systems, hardware, peripherals, and software, including network key fobs and other devices.
- Closed-circuit television (CCTV) and all other physical security systems and devices, including access key cards and fobs.
General Provisions
Company IT resources and communications systems are to be used for business purposes only unless otherwise permitted under applicable law.
All content maintained in Company IT resources and communications systems are the property of the Company. Therefore, employees should have no expectation of privacy in any message, file, data, document, facsimile, telephone conversation, social media post, conversation, or any other kind or form of information or communication transmitted to, received, or printed from, or stored or recorded on Company electronic information and communications systems.
The Company reserves the right to monitor, intercept, and/or review all data transmitted, received, or downloaded over Company IT resources and communications systems in accordance with applicable law. Any individual who is given access to the system is hereby given notice that the Company will exercise this right periodically, without prior notice and without prior consent.
The interests of the Company in monitoring and intercepting data include, but are not limited to: protection of Company trade secrets, proprietary information, and similar confidential commercially-sensitive information (i.e. financial or sales records/reports, marketing or business strategies/plans, product development, customer lists, patents, trademarks, etc.); managing the use of the computer system; and/or assisting employees in the management of electronic data during periods of absence.
You should not interpret the use of password protection as creating a right or expectation of privacy, nor should you have a right or expectation of privacy regarding the receipt, transmission, or storage of data on Company IT resources and communications systems.
Do not use Company IT resources and communications systems for any matter that you would like to be kept private or confidential.
Violations
If you violate this policy, you will be subject to corrective action, up to and including termination of employment. If necessary, the Company will also advise law enforcement officials of any illegal conduct.