Compare cert salaries and plan your next career move
tiersten wrote: » The managers should just set this as a computer usage policy IMO. Policing this yourself will make you a tad unpopular...
All e-mail correspondence is the property of <Company name>. Employee e-mail communications are not considered private despite any such designation either by the sender or the recipient. <Company name> reserves the right to monitor its e-mail system – including an employee’s mailbox – at its discretion in the ordinary course of business. Please note that in certain situations, <Company name> may be compelled to access and disclose messages sent over its e-mail system. Employees are expected to use business etiquette when sending e-mail to others. Use of inappropriate language or graphics is prohibited. Employees must be careful when addressing e-mail, especially when delivering confidential information. Messages sent to recipients outside of <Company name>, if sent over the Internet and not encrypted, are not secure. The existence of passwords and “message delete” functions do not restrict or eliminate <Company name's> ability or right to access electronic communications. Employees shall not share an e-mail password, provide e-mail access to an unauthorized user, or access another user’s e-mail box without authorization. Employees shall not post, display or make easily available any access information, including, but not limited to, passwords. Offensive, demeaning or disruptive messages are prohibited. This includes, but is not limited to, messages that are inconsistent with <Company name's> policies concerning Equal Employment Opportunity and unlawful harassment. If non-<Company name> employees or any 3rd-party sends any offensive, demeaning or disruptive messages, it is the employee’s responsibility to either notify the party to cease themselves or notify your <Company name> manager or the IT Department who will take appropriate steps to stop the activity. Any employee who violates this policy shall be subject to discipline, up to and including termination.
RTmarc wrote: » Somewhat a tangent, but how did keeping the "PSTs in the users network folder" work out? That is - or was at one point - a big no-no because of corruption issues but it is something I've always wanted to do.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.