- Workplace Communication /Employee Internal Communication
Refers to the exchange of ideas and communication within an organisation. Employees at (Name of the company) are encouraged to communicate with their superiors, peers, subordinates in a manner which is productive and contributes to achieving the goals of the Company
- External and Social Media Communication
Lays down the provisions for dealing with communications outside the workplace, with regard to Company matters. Since having inaccurate information reach the public can have serious legal and financial consequences for the company, all such matters shall strictly be routed through the Company spokesperson. Posting on social media websites requires exercising discretion in matters related to the Company.
- Electronic and Wireless
To facilitate swift communications, we at (Name of the company) provide cell phones and other wireless handheld devices to our employees. It becomes the responsibility of the respective employees to keep such devices safely password protected, with up to date antivirus programs and maintain email etiquette at all times.
IT And Communications Policy Template
- Employee Internal Communication
Effective internal communication is a tool which is of utmost importance to maintaining transparency within the company amongst employees. There are different modes of internal communications you can look forward to at (Name of the company)
- Meetings
Meetings are formal means of communication which happen constantly through all the departments. People handling functions which occur at multiple destinations and those who work independently, are required to meet on a regular basis.
In addition to this would be the regular meetings of the department heads with Company management, to ensure smooth functioning.
- Company Intranet
All important communication from the company to the employees will be handled through our intranet system. Information such as messages from the CEO’s desk, events lineup for the month/year ahead, important announcements, training requirements and modules and suggestion corners will all be found on our Intranet
- Townhall Meetings
We at (Name of the company) believe in transparency in communication across the organisation and the access of all the employees to the Company’s management. This town hall meeting is conducted once a (time frame) on first/last (day of the week)
External And Social Media Communication
Employees may be contacted at different points of time by the media or outside sources with a request for information about the Company or its employees or policies. In order to avoid providing inaccurate or incomplete information, all outside queries regarding the Company need to be routed through the spokesperson of the Company. This would save the Company considerable loss financially and/or legally in the absence of an organised channel to handle outside queries.
When it comes to posting on social media, employees may/may not associate themselves with the company. If they are allowed to associate themselves with the Company, the employees must clearly brand their online posts as personal and purely their own. The Company will not be held responsible for any repercussions the posts might generate.
Divulging sensitive Company information is strictly prohibited and will be penalised. Employees may refer to the Social Media Policy section in this document for more details.
Electronic And Wireless Policy
(Name of the company) has formulated the electronic policy in order to maintain the security of our data and technology infrastructure. The policy will apply to all employees, contractors and anyone else who has permanent or temporary access to our software and hardware.
We advise our employees to keep both their personal and company issued electronic devices safely password protected and upgrading to an effective antivirus software. The employees must at all times ensure to login through secure networks only.
Cell Phone Policy
The cell phone policy applies to any device that can make or receive phone calls, leave messages, send text messages, surf the internet, download information and view and respond to emails whether the device is personal or company owned. Cell phones given by the company need to be kept switched on at all times during working hours, during work related travel and other times specifically mentioned by the company.
Use of cell phones are discouraged
- While driving
- While operating equipment
- During office hours for gaming and entertainment
- For indulging in long personal calls during office hours
- During meetings
- From recording sensitive information pertaining to the company
Employees can use cell phones for
- Making business calls
- Using productivity applications
- Checking important messages
- Scheduling and keeping track of appointments
- Making brief personal calls out of earshot of other employees
(Name of the company) retains the right to monitor employees for inappropriate and excessive cell phone usage
Employees may face disciplinary action if it is proven that
- They have caused a security breach
- They have violated confidentiality policy
- They have caused an accident due to reckless use of their cell phone
Internet Usage Policy
The electronic communication system must be utilised exclusively to facilitate the business of the Company. Employees are cautioned against using the internet for matters of personal gain and entertainment. Employees should further expect that all content created, transmitted, downloaded, received or stored in the hardware belonging to the Company is subject to perusal by the Company and that no element of privacy holds good here. This information maybe accessed without prior notice to the employee. This applies for password protected documents and any deleted content too.
What constitutes appropriate internet usage
- To complete jobs assigned
- To seek information on that, which can improve the work quality of the employee
Inappropriate internet usage
- Download or upload obscene, offensive and/or illegal material
- Send confidential information to unauthorised recipients
- Invade another person’s privacy
- Upload any kind of pirated software
- Visit potentially dangerous websites which can compromise the safety of the Company network
- Performing unauthorised/illegal actions hacking or purchasing prohibited items
- Forwarding any content which is discriminatory and obscene/inappropriate
The company advises using strong passwords and logging into accounts only from safe devices and to maintain their work devices locked at all times. Failure to adhere to the guidelines may result in disciplinary action and/or lead to employment termination
Cyber Security Policy
The security of our data is of utmost importance and we wish to maintain maximum security in the protection of any sensitive information pertaining to (Name of the company). Employees need to ensure that they do not disclose Company confidential data intentionally or unintentionally to anyone who is not a part of our organisation.
Examples of Confidential Data
- Classified financial information
- Customer Data
- Data pertaining to partners and vendors
- Patents, formulas and new technologies
Use Of Personal Devices
(Name of the Company) does not encourage logging into Company accounts from any personal devices since it would put Company information at severe risk. In case it becomes inevitable to do so, employees are advised to keep such devices in a safe place. It must at all times be borne in mind that all devices whether personal or company owned need to be password protected, appropriate antivirus installed, regularly installed with security updates and logged in through safe networks.
Email Security
Email is a routine communication method within the company as well as with investors, business partners and our customers.
Many times emails can carry malicious content which might compromise the security of the Company. Employees are advised to maintain discretion at all times with respect to
- Opening mail with attachments wherein the content is not clearly explained
- Unknown senders and email addresses
- Inconsistent emails
- Mails with clickbait titles (offering prize money or advice)
Managing Passwords
To prevent company email accounts from being hacked,every employee is required to follow these safety practices
- Ensure password is at least 8 characters long with a mix of alphabets, numerals and special characters
- Do not write down passwords and leave them easily accessible
- Do not share or exchange credentials
- Change password every (number) of days/month (period of time)
Transferring Data
The data transfer stage is an easy mode for cyber crime to occur. Keeping in mind some best practices will bring down the risk considerably.
- Avoid transferring employee and customer confidential data to other devices
- Share confidential data over Company network and not over public WiFi systems or private networks
- Ensure that the recipients of the data are authorised people or organisations with adequate security policies in place
- Report scams, privacy breaches or hacking attempts
Working Remotely
Even when working remotely, the employee must follow the cybersecurity policies and procedures
Employees observed to disregard the cybersecurity policy and procedures will face progressive discipline
Social Media Policy
Social Media refers to the various online media such as blogs, chatrooms, social networks and forums. Every employee has an opportunity to express themselves online and the organisation supports/does not support it because of the nature of work involved. It is extremely important to mention here that the employee is prudent about what information makes its way online to social media
Highlights of the policy
- When employees neglect their duties and spend time online, there will be a decrease in productivity which reflects on their performance.This is not acceptable behaviour and (Name of the organisation) will penalize the employee
- All our employees when expressing an opinion should identify themselves clearly, issue a disclaimer clause stating any/all opinions stated there are their own and do not in any way represent that of the company
- Corporate logos and/or trademarks must not be used by any individual in any such communication unless with specific approval
- Avoid making or responding to any derogatory, defamatory or offensive statements.
Certain employees are designated to handle the social media accounts of the company and will be communicating on behalf of (Name of the company) as its representatives. The policy holds good for these employees with additional points to be borne in mind such as
- Be respectful, polite and patient while engaging in communication on behalf of the company
- Avoid speaking outside your area of expertise
- Follow the data protection policy as well as the confidentiality policy at all times
- Avoid deleting or ignoring certain remarks. Criticism must be responded to in a polite and apt way
- Never post abusive, offensive or discriminatory content
- Correct or remove any false or misleading information as soon as possible.
It must be duly noted that any and all such social media posting will be monitored closely. We may have to take disciplinary action against individual(s) leading to termination too for those who do not follow policy guidelines.
Asset Usage Policy
Our asset management policy highlights the best practices of our organisation. It is aimed to foster operational excellence and eliminate situations where people could deviate from doing their best always. In this manner people and equipment reach their full potential. It also reduces the chances of unplanned maintenance.
This policy applies to all employees, consultants and contractors with access to (Company name) information assets that are owned, leased or licensed to (Company name)
Ownership and Use
- Personnel will be held responsible for all activity under their personnel (Company name) id
- Personnel with accounts will access only systems, applications, files and data to which they have been granted access
- All information pertaining to (Name of the company) shall only be stored, transmitted or shared through services authorised by the Company
- Only approved and authorised electronic equipment maybe connected to (Name of the company) information assets.
Asset Recovery
Company assets are issued to certain employees based on their work profile. These could be laptop, mobile phones, data cards, pen drive, etc The respective employees are responsible for the general maintenance and upkeep of the same. In the event that it is found that the asset is lost or damaged due to negligence on the part of the employee, the Company reserves the right to recover the cost of repairing or replacing the same as may be necessary.