Evidence Solutions, Inc., (ESI) is a premier forensics company founded in 1982.

ESI Provides Elite experts in:

Digital and Electronic Evidence, Computer Forensics, Cell Phone Forensics
Trucking, Truck Accident Investigation and Trucking Regulations, Truck Safety Consulting, Heavy Vehicles & Hazardous Materials
Sports and Fitness, Fitness Facility Standard of Care
Real Estate & Land, Real Estate Syndication
Bankruptcy and Corporate Governance
Accident Reconstruction

Call for a free consultation: 866-795-7166

Intellectual Property Expert Witness:
Sample Internet Usage Policy.

Intellectual Property Evidence / Digital Evidence Forensics Articles

By Scott Greene

 ------------------------------------------------------------

In today's technology world, almost every company uses computers. Over the next few weeks, Evidence Solutions, Inc. will be delivering some sample policies which can be used in your organization. Our Holiday Gift to You.

Evidence Solutions, Inc. Policy and Procedures Image

Sample Internet Usage Policy

COMPANY may provide you with Internet access to help you do your job. This policy explains our guidelines for using the Internet.

All Internet activity that is written, sent, or received through our computer systems is part of official COMPANY records. That means that we can be legally required to show that information to law enforcement or other parties. Therefore, you should always make sure that the business information contained in Internet email messages and other transmissions is accurate, appropriate, ethical, and legal.

The equipment, services, and technology that you use to access the Internet are the property of COMPANY. Therefore, the COMPANY reserves the right to monitor your Internet usage. We also reserve the right to find and read any data that you write, send, or receive through our online connections or is stored in our computer systems.

You may not write, send, read, or receive data through the Internet that contains content that could be considered discriminatory, offensive, obscene, threatening, harassing, intimidating, or disruptive to any employee or other person whether inside or outside of the COMPANY.

Examples of unacceptable content include (but are not limited to) sexual comments or images, racial slurs, gender-specific comments, or other comments or images that could reasonably offend someone on the basis of race, age, sex, religious or political beliefs, national origin, disability, sexual orientation, or any other characteristic protected by law.

COMPANY does not allow the unauthorized use, installation, copying, or distribution of copyrighted, trademarked, or patented material on the Internet. As a general rule, if you did not create the material, do not own the rights to it, or have not received authorization for its use, you may not put the material on the Internet. You are also responsible for making sure that anyone who sends you material over the Internet has the appropriate distribution rights.

If you use the Internet in a way that violates the law or COMPANY policies, you will be subject to disciplinary action, up to and including termination of employment. You may also be held personally liable for violating this policy.

The following are some examples of prohibited activities that violate this Internet policy:

  • Sending or posting discriminatory, harassing, or threatening messages or images
  • Using the COMPANY’S time and resources for personal gain
  • Stealing, using, or disclosing someone else's password without authorization
  • Copying, pirating, or downloading software and electronic files without permission, against copyright laws or licensing
  • Sending or posting confidential material, trade secrets, or proprietary information outside of the COMPANY
  • Failing to observe licensing agreements
  • Engaging in unauthorized transactions that may incur a cost to the COMPANY
  • Sending or posting messages or material that could damage the COMPANY’S image or reputation
  • Participating in the viewing or exchange of pornography or obscene materials
  • Sending or posting messages that defame or slander other individuals or organizations
  • Attempting to break into the computer system that you are not authorized to access
  • Refusing to cooperate with any investigation
  • Sending or posting chain letters, solicitations, or advertisements not related to COMPANY’S business purposes or activities
  • Using the Internet for political causes or activities, religious activities, or any sort of gambling
  • Jeopardizing the security of the COMPANY’S electronic communications systems
  • Sending or posting messages that disparage another organization, its products or services
  • Passing off personal views as representing those of the COMPANY
  • Sending anonymous email messages or spam
  • Engaging in any other illegal activities

Evidence Solutions, Inc.

Complex Electronic Evidence in PLAIN English.

Call us today with your Digital Evidence Questions: 866-795-7166 or This email address is being protected from spambots. You need JavaScript enabled to view it.

Related Articles & Pages:

Law Firms Must Step Up Cybersecurity!

 

Employee Termination Checklist

Clean Desk Policy | Digital Forensics Expert Witness

Employee Theft of Intellectual Property

Managing the Risky Business of Company E-mail Part 1

Managing the Risky Business of Company E-mail Part 2

 

Like Evidence Solutions - Intellectual Property Experts on Facebook

Follow Evidence Solutions - Intellectual Property Experts on LinkedIn

Circle Evidence Solutions - Intellectual Property Experts on Google+

Google+ Author

Google+ Publisher