
|
EMAIL
AND MESSAGING SYSTEMS
Intracoastal Transportation, Inc provides employees with access to various
electronic mail and other electronic messaging systems (E-mail). These
E-mail systems and the information contained in them are the property
of Intracoastal Transportation, Inc and are primarily for business use.
Most messages sent over these media should be Intracoastal Transportation,
Inc-related and should be treated the same as other Intracoastal Transportation,
Inc records. Non-business related company advertising is for Intracoastal
Transportation, Inc sponsored events or items only (for example, recreation
committee activities such as the Year End Party) or must be distributed
through authorized company communication channels. Employees must use
good judgement in the amount and content of personal E-mail.
Intracoastal Transportation, Inc reserves the right to audit, monitor
and access, for any purpose, all messages and transactions sent over the
Intracoastal Transportation, Inc E-mail systems. Intracoastal Transportation,
Inc also reserves the right to decrypt any E-mail messages sent over the
Intracoastal Transportation, Inc E-mail systems. Employees must use E-mail
in a professional manner. Personal views expressed by employees in E-mail
messages are not necessarily those of Intracoastal Transportation, Inc.
All illegal, unauthorized, or inappropriate use of E-mail by any person,
including temporary employees, contractors and interns, may result in
disciplinary action up to and including legal action and/or termination
of employment, assignment or contract. Misuse of E-mail, including the
use of E-mail for unauthorized personal advertising, E-mail forgery and/or
tampering with the Intracoastal Transportation, Inc E-mail systems and/or
bulletin board systems (BBS) is a violation of this policy. Any employee
who deliberately reads another employee's E-mail without permission may
be terminated immediately from his/her employment with Intracoastal Transportation,
Inc. Exceptions to this are made for employees who conduct a company authorized
review of employees' E-mail activity.
A few examples of activities prohibited by this policy include intentionally
impersonating and/or misrepresenting another; modifying a message and
forwarding without noting the changes (deletions, removal of recipients,
modify content, and so forth with the intent to thereby deceive the recipient);
bypassing the user-security mechanisms of the system in a malicious manner
(such as creating bogus accounts); forwarding company sensitive or confidential
information to external sources without the appropriate authorization
or non-disclosure agreement (highly confidential information should not
be sent because Internet messages are susceptible of interception by outsiders);
participating in E-mail "chain letters"; distributing unauthorized
personal advertisements for yourself or others (junk mail); and knowingly
burdening corporate network bandwidth with non-business data (such as
forwarding large graphics to a distribution list).
Managers are responsible for reminding their employees about this E-mail
Policy. Employees who have questions about the policy should discuss them
with their manager or with their Manager.
Return to Links Page |