If you don’t have a policy like this and you are not sure where to start, Chris gives a great template you can begin using in your business or organization.
Note: Make sure to replace the company name as needed.
“All content maintained in Company IT resources and communications systems are the property of the Company. Therefore, employees should have no expectation of privacy in any message, file, data, document, telephone conversation, social media post, conversation, or any other kind or form of information or communication transmitted to, received, or printed from, or stored or recorded on Company electronic information and communications systems –including Company-owned mobile devices. The Company reserves the right to monitor, intercept, and/or review all data transmitted, received, or downloaded over Company IT resources and communications systems in accordance with applicable law. Any individual who is given access to the system is hereby given notice that the Company will exercise this right periodically, without prior notice and without prior consent.
The interests of the Company in monitoring and intercepting data include, but are not limited to: protection of Company trade secrets, proprietary information, and similar confidential commercially-sensitive information (i.e. financial or sales records/reports, marketing or business strategies/plans, product development, customer lists, patents, trademarks, etc.); managing the use of the computer system; and/or assisting employees in the management of electronic data during periods of absence.”
(To learn more and see the Cybersecurity Essentials List visit this link here: https://youtu.be/A50vRiJ_QVo )
Are you ready to work with a professional IT solutions provider? Contact Petra Technologies today!
This post was first published on petratechit.com.